News

2019-06-13

Ransomware & Malware Make Way For New Attack Vectors

Attackers are developing new covert techniques which are harder to detect and defend against than conventional malware, says Microsoft.

2019-06-13

Wanted: An International Cyber Security Law

The global Domain Name System (DNS) is a central part of the internet and it needs to have legal protection by international treaty.

2019-06-13

Five Reasons To Learn Cyber Security

Thinking About Your Career? Cyber security experts are in demand with high pay, good prospects and intriguing employment options.

2019-06-12

EU Has Approved Cyber-Attack Sanctions

The EU will apply an automatic set of sanctions to punish any future cyber attacker, to include asset freezes and travel bans on individuals.

2019-06-12

Ford Cars Employ New AI Systems

Ford has joined with Baidu to offer road users in China AI powered AWD traction control and in-car infotainment systems.

2019-06-11

Iranian Fake News Websites Exposed

'Endless MayFly' is an Iran-aligned network of inauthentic websites and online personas used to spread false and divisive information.

2019-05-28

Three New Free Cyber First Courses For Students

Cutting-edge cyber security student courses from CyberFirst backed by the National Cyber Security Centre (NCSC) courses, starting in Scotland.

2019-06-11

Dealing With Malicious Emails

Malicious email attachments are an increasingly dangerous threat to every organisation's security. Don't click any links, don't download attachments.

2019-06-10

Career Opportunities In Cybersecurity

The importance of building secure strategies for business & government offers many great opportunities to people with the relevant skills.

2019-06-10

The ‘Rules’ Of Modern Warfare Are Being Rewritten

Politically-motivated cyber-attacks are commonplace but cyberwarfare can be launched by groups of individuals, not just nation-states.

2019-06-07

Banks Investing Serious Money In Blockchain

Some very big banks are jointly investing $50m to create a digital cash system using blockchain technology to settle financial transactions.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Future Foundation (CFF)

Cyber Future Foundation (CFF)

CFF was established to create a cyberspace where digital commerce and innovation can thrive based on trust and respect to individual privacy.

ProtonMail

ProtonMail

ProtonMail is an easy to use secure email service with built-in end-to-end encryption and state of the art security features.

Information Technology Industry Development Agency (ITIDA)

Information Technology Industry Development Agency (ITIDA)

ITIDA has two broad goals: building the capacities of Egypt’s local information and communications technology (ICT) industry and attracting foreign direct investments to boost the ICT sector.

Quokka

Quokka

Quokka (formerly Kryptowire) is the source for mobile security and privacy solutions, staying steps ahead of the threat and delivering peace of mind.

CMMI Institute

CMMI Institute

CMMI Institute enables organizations to elevate and benchmark performance across a range of critical business capabilities, including product development, data management and cybersecurity.

ENAC

ENAC

ENAC is the national accreditation body for Spain. The directory of members provides details of organisations offering certification services for ISO 27001.

Naukrigulf

Naukrigulf

Naukrigulf.com is one of the fastest growing job sites in the Gulf, with thousands of registered job seekers and a robust CV database across many sectors, including cybersecurity.

Council of Europe Convention on Cybercrime

Council of Europe Convention on Cybercrime

The Council of Europe helps to protect societies worldwide from the threat of cybercrime through the Convention on Cybercrime.

ICS Cyber Security Conference

ICS Cyber Security Conference

SecurityWeek’s Industrial Control Systems (ICS) Cyber Security Conference is the largest and longest-running event series focused on industrial cybersecurity.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

NSW Cyber Security Innovation Node

NSW Cyber Security Innovation Node

NSW Cyber Security Innovation Node is part of a national network designed to foster and accelerate cyber capability and innovation across Australia.

Passbase

Passbase

Passbase is building a full-stack identity verification engine backed by verified government documents.

Control System Cyber Security Association International (CS2AI)

Control System Cyber Security Association International (CS2AI)

CS2AI is the premier global not for profit workforce development organization supporting professionals of all levels charged with securing control systems.

Tabidus Technology

Tabidus Technology

Tabidus Technology is a cybersecurity association that unites and provides the global protection options against cyber threats.

ESC - Enterprise Security Center

ESC - Enterprise Security Center

ESC is a system house specializing exclusively in IT security - Security Implementation & Optimization, Operations, Managed Security Services.

Aceiss

Aceiss

Aceiss empowers access security, providing unprecedented visibility and insights into user access.

Benchmark IT Services (BITS)

Benchmark IT Services (BITS)

BITS is a leading cyber security company in Australia. Our certified professionals work with you to keep your data assets safe and secure.

TerraEagle

TerraEagle

Terraeagle is a boutique cyber security services company providing tailor-made solutions. Our core competency is in SOCaaS, MDRaaS & and Incident Response Retainer Services.