News

2018-09-11

Do Companies Need A Chief AI Officer?

For many companies, Artificial Intelligence and a range of Cognitive Technologies are becoming a strategic part of their business operations.

2018-09-11

DARPA Attempt Telepathic Communication With Drones

A person with a brain chip can now pilot a swarm of drones, or even advanced fighter jets, using a new brain-computer interface technique.

2018-09-10

British Airways Data Breach

Under the newly enforced GDPR rules BA could face potentially significant fines from the UK ICO for a data breach affecting 380,000 transactions.

2018-09-10

Big Companies Have An Achilles Heel

The proliferation of network access points experienced by large organisations is multiplying both their risks and their potential liabilities.

2018-09-07

British Airways Fake Facebook Page

The bogus “British Airways Holidays”page steals personal data by claiming you can win holidays and free air travel by clicking a “Sign Up” button.

2018-09-10

Widepsread Campaign Hacking Instagram Accounts

The hack sees account names, profile pictures, passwords and email addresses changed with new data originating from a Russian provider.

2018-09-06

Germany Promotes Cybersecurity Research

The German government wants to end reliance on digital technologies from the United States, China and others by building its own capabilities.

2018-09-06

Digital Shock: Cybercrime & The Future Of Policing. Part 3

With an online crime reported every ten minutes British Police forces are belatedly investing in cybersecurity training. (£) By Alfred Rolington

2018-09-05

Digital Shock: Cybercrime & The Future Of Policing. Part 3

With an online crime reported every ten minutes British Police forces are belatedly investing in cybersecurity training. (£) By Alfred Rolington

2018-09-06

Hackers Breach Cryptocurrency Platform

Cryptocurrency platforms are increasingly targeted by cybercriminals and Atlas Quantum is the latest to be breached with 240,000 users compromised.

2018-09-04

Iranian Political Influence Campaign Goes Global

Iranian influence operations targeting internet users worldwide are significantly bigger than previously identified.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Vera Security

Vera Security

Vera is a data security platform that provides 360-degree visibility and control over critical business data, anywhere it's shared or stored.

Napatech

Napatech

Napatech develops and manufactures high speed network accelerators specifically designed for real-time network monitoring and analysis applications.

CSIRT Malta

CSIRT Malta

CSIRT Malta supports critical infrastructure organisations in Malta on how to protect their information infrastructure assets and systems from cyber threats and incidents.

Automation & Cyber Solutions (ACS)

Automation & Cyber Solutions (ACS)

Automation & Cyber Solutions delivers a range of Industrial Automation and Cyber solutions & services to sectors including Oil & Gas, Chemicals & Petrochemicals, Power and others.

Culinda

Culinda

Culinda secures medical IoT devices in hospitals with An Artificial Intelligence platform and security gateway.

Buglab

Buglab

The Buglab contest and Vigilante Protocol help companies all over the world to discover and fix vulnerabilities on their digital solutions or assets.

CyberSat Summit

CyberSat Summit

CyberSat is dedicated to fostering the necessary discussions to flesh out and develop solutions to cyber threats in the satellite industry.

INFRA Security & Vulnerability Scanner

INFRA Security & Vulnerability Scanner

INFRA is a powerful platform with an easy interface for any kind of Ethical Hacking, from corporate monitoring and VAPT (vulnerability assessments and penetration testing) to military intelligence.

ECHO Project

ECHO Project

The main objective of ECHO is to strengthen the cyber defence of the European Union, enhancing Europe’s technological sovereignty through effective and efficient multi-sector collaboration.

Audea

Audea

Audea is a consultancy firm specialising in cybersecurity, risk and compliance. We provide professional services addressing all areas of Cybersecurity and GRC.

stackArmor

stackArmor

stackArmor specializes in compliance and security-focused solutions delivered using our Agile Cloud Transformation (ACT) methodology.

Stronger International

Stronger International

Stronger International provides expert cyber services and training to organizations and individuals to enhance IT and security knowledge.

Vaultinum

Vaultinum

Vaultinum are a trusted independent third party specialized in the protection and audit of digital assets.

Bores Security Consultancy

Bores Security Consultancy

Bores Security Consultancy are an established family-run business delivering expertise in security and technology.

Quod Orbis

Quod Orbis

Quod Orbis are a fast-growing, innovative company providing market-leading expertise in cyber security and Continuous Controls Monitoring (CCM).

Sprocket Security

Sprocket Security

Sprocket Security protects your business by monitoring the cybersecurity landscape and performing continuous penetration testing services.