News

2019-07-03

US Attackers Target Iran's Defense Networks

US Cyber Command is reported to have found a way to penetrate Iranian military networks to attack and neutralise air defense missile systems.

2019-07-02

Britain Wants More Women In Cyber Security

Lots of schoolgirls are creating digital waves but there are still too few women in the cyber security sector. The UK government wants to fix that.

2019-07-02

Staying Secure When Travelling For Business

The transport industry is vulnerable and Business Travellers are some of the most at-risk victims of cyberattacks, but they don't seem to realise it.

2019-07-02

Tackling The ‘Splinternet’

Rapid advances in technical capabilities and the associated rise in security threats have overtaken effective regulation in the digital economy.

2019-07-01

AI Makes Cyber Attacks More Destructive

Artificial Intelligence will be used by attackers to drive the next major upgrade in cyber weaponry and will ultimately pioneer AI's malicious use.

2019-07-01

Alarming Trends In Data Theft

Singapore continues to be a focus for attacks by advanced threat actors and the national Cyber Security Agency reports some alarming trends.

2019-07-01

US Hackers Penetrate Russia's Electric Grid

Responding to an order to go on the offensive, US Cyber Command is reported to have been busy planting malicious malware in critical infrastructure.

2019-06-28

SMEs Need A Disaster Recovery Plan

For Small and Medium sized businesses the cost of not updating Disaster Recovery systems can far exceed the price of staying on top of the risks.

2019-06-26

US Cyber Attack On Iran

Unleash The Hackers: US missile forces stand down as President Trump orders Cyber Command to take the lead role in attacking targets in Iran.

2019-06-27

British Police Forensics Attacked

Half of the UK police's forensic data analysis capacity has been knocked out of action following a ransom attack on a major service supplier.

2019-06-27

A Cyber Toolkit For Small Business

Smaller companies need to put in place specific cyber protection solutions to guard against the significant risks of a data breach.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

InfoSecurity Magazine

InfoSecurity Magazine

Infosecurity Magazine has over ten years of experience providing knowledge and insight into the information security industry.

CERT.BY

CERT.BY

The National Computer Emergency Response Team of the Republic of Belarus.

PhishLabs

PhishLabs

PhishLabs provides 24/7 services that help organizations protect against the cyberattacks targeting their employees, their customers and their brands.

ISC2

ISC2

ISC2 is an international, non-profit membership association for information security leaders. Our information security certifications are recognized as the global standard for excellence.

Protection Group International (PGI)

Protection Group International (PGI)

PGI helps organisations and governments to manage digital risk. From cyber security services to business intelligence, we help reduce the risks to your finances, reputation, assets and people.

CybeReady

CybeReady

CybeReady’s Autonomous Platform offers continuous adaptive training to all employees and guarantees significant reduction in organizational risk of phishing attacks.

Red Points

Red Points

Red Points protects your brand and content in the digital environment.

Neudomains

Neudomains

Neudomains is a Corporate Domain Name Management and Brand Protection Online Specialist. One of the world's top providers of online brand protection and enforcement.

Cloud Box Technologies

Cloud Box Technologies

Cloud Box Technologies is one of the premier IT Infrastructure Solution providers in the Middle East.

Brookcourt Solutions

Brookcourt Solutions

Brookcourt Solutions delivers cyber security, network monitoring technologies and managed security services to help secure and protect your organisation’s critical infrastructure.

Secmation

Secmation

Secmation are an agile engineering services firm providing advanced DoD level security design and consultation services for both commercial and defense hardware and software applications.

Albania Lab

Albania Lab

Albania Lab is a consulting company focused on the development and delivery of digital solutions and IT services including cybersecurity.

IDECSI

IDECSI

IDECSI delivers cutting-edge technology and engages all employees in the security system for effective and cost-efficient data protection.

VP Techno Labs

VP Techno Labs

VP Techno Labs is an award-winning cybersecurity firm focusing only cybersecurity to develop cutting edge solutions for emerging business.

Salus Cyber

Salus Cyber

Salus is a provider of world-class cyber security services, enabling our clients to identify and manage their cyber risks proactively and effectively.

CovertSwarm

CovertSwarm

Since 2020 CovertSwarm have been radically redefining how enterprise security risks are discovered. We outpace the cyber threats faced by our clients using a constant cyber attack methodology.