News

2019-07-17

The Cyber Effects Of Industry 4.0 On Warfare

We are experiencing the next Industrial revolution and the effects are changing geo-politics, military tactics & warfare. By Alfred Rolington

2019-07-16

AI Solves Beatles Songwriting Dispute

Was it John Lennon or Paul McCartney? An algorithm has learned to read musical fingerprints to help resolve arguments over a song’s origins.

2019-07-16

Croatian Government Targeted By Mystery Hackers

Croatian officials are spear-phished with an innovative technique that looks like the malware distribution platform used to disrupt Crimea.

2019-07-16

Vietnam’s Top Hacking Group Uses Sloppy Code

OceanLotus group is notorious for using carefully crafted tools to breach Vietnamese companies in the manufacturing and hospitality sectors.

2019-07-15

India & Japan In Cyber Security Pact

India and Japan have decided to collaborate in the areas of cyber security and outer-space as part of their growing security partnership.

2019-07-15

Five Ways HR Can Improve Cyber Security

It's not just an IT responsibility. HR professionals need to ensure employees’ skills are updated to encompass cyber security.

2019-07-15

Cyber Essentials For Board Directors

Most Board Directors now realise that Cyber-Threats risk serious damage and that Cyber Security must be regularly assessed. Don't they?

2019-07-12

2019: Cybersecurity Is In Crisis

After 6 months of data breaches, supply chain manipulations & state-backed hacking campaigns, some say the worst of 2019 is yet to come.

2019-07-11

BA Faces £183m Data Breach Fine

British Airways will be fined the biggest penalty handed out by the UK regulator so far and the first one to be made public under new GDPR rules.

2019-07-11

Wanted: Clarity About Cyber Insurance Cover

Lloyd’s of London wants all insurance policies to explicitly state whether coverage will be provided for losses caused by a cyber-attack.

2019-07-11

US Electoral Infrastructure Is Wide Open To Hackers

Most US electronic voting systems are nothing but bare-bone, decade old computer systems that lack even rudimentary endpoint security.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Varonis

Varonis

Varonis provide a security software platform to let organizations track, visualize, analyze and protect their unstructured data.

Technology Association of Georgia (TAG)

Technology Association of Georgia (TAG)

TAG's mission is to educate, promote, influence and unite Georgia's technology community to stimulate and enhance Georgia's tech-based economy.

Karamba Security

Karamba Security

Karamba provide an IoT Security solution for ECUs in automobiles which ensures that all cars are protected (not just autonomous cars).

Celare

Celare

Celare delivers DPI based network perimeter monitoring solutions with integrated Big Data security analytics and threat detection.

cPacket Networks

cPacket Networks

cPacket’s distributed intelligence enables network operators to proactively identify imminent issues before they negatively impact end-users.

Hitachi Systems Security

Hitachi Systems Security

Hitachi Systems Security provides customized services for monitoring and protecting the most critical and sensitive IT assets in our clients’ infrastructures 24/7.

WetStone Technologies

WetStone Technologies

WetStone develops software solutions that support investigators and analysts engaged in eCrime Investigation, eForensics and incident response activities.

ReFoMa

ReFoMa

ReFoMa is a consultancy and advisory company with a focus on information Security.

Cyber Struggle

Cyber Struggle

At Cyber Struggle, our aim is training and certifying the special forces of the cyber world.

Buchbinder Information Technology Solutions

Buchbinder Information Technology Solutions

Buchbinder Tunick & Company is a premier CPA and advisory firm offering a broad range of assurance, tax, business consulting and IT consulting services.

Protek International

Protek International

Protek International delivers world-class Digital Forensics, eDiscovery, Cyber Security, and related Advisory services.

Ward Solutions

Ward Solutions

Ward Solutions are an information security consultancy and managed services company. We help organisations protect their brand, people, assets, intellectual property and profits.

Cyber Security Works (CSW)

Cyber Security Works (CSW)

Cyber Security Works is your organization’s early cybersecurity warning system to help prevent attacks before they happen.

Campus cyber

Campus cyber

A project initiated by the President of the Republic, the Cyber Campus is the totem site of cybersecurity that brings together the main national and international players in the field.

Emircom

Emircom

Emircom is one of the Middle East's leading independent providers of IT infrastructure services, helping clients to drive growth and deliver measurable outcomes.

Forward Networks

Forward Networks

Forward Networks - transforming networks to be more reliable, agile, and secure.