News

2018-07-02

What War Games Tell Us About The Use Of Cyber Weapons

The US defence establishment have been gaming cyber warfare to find out if cyber weapons are equally as destructive as conventional weapons.

2018-06-29

Cyber Attackers Tunnel Into Financial Services Firms

Global financial services organisations are targeted by sophisticated cyber attackers to steal critical data and personally-identifiable information.

2018-06-29

Cybersecurity Issues For Open Banking

Only a standardised, industry-wide format will give the security and assure the level of trust crucial to the success of the Open Banking initiative.

2018-06-28

Effective Data Security Is A Team Effort

Delivering effective data security in today’s business environment can be challenging. To achieve it takes teamwork and communication.

2018-06-28

IBM’s AI Can Argue With Humans

Bringing practical applications to AI technology has proven difficult and IBM's Project Debater shows there is a long way to go.

2018-06-28

How to Measure Cybersecurity Success

When performance is measured, performance improves. When performance is measured and reported, the rate of improvement accelerates.

2018-06-27

13 Ways Cyber Criminals Spread Malware

A search of darknet forums reveals a wide range of techniques used by criminal hackers to spread malware, steal data and plant crypto ransomware.

2018-06-27

A Guide To Addressing Corporate IoT Security

What can enterprises do to strengthen the security of their IoT environments? Here are some suggested best practices from industry experts.

2018-06-28

Former UK Spy Boss Say Russia Is 'live testing' Cyber-Attacks

The problem posed by nation state attackers has increased over the last five years and become an issue for enterprises as well as governments.

2018-06-27

Ukraine Says Russian Hackers Are Preparing A Massive Strike

Hackers from Russia are infecting Ukrainian companies with malicious software to create “back doors” for a large, coordinated attack.

2018-06-26

Chinese Hack Breached US Satellites

Hackers infected computers controlling critical US communications satellites, so that they could change orbital positions and disrupt data traffic.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

SealPath

SealPath

SealPath enables companies to protect and control their documents wherever they are: In their PC, in their corporate network, on a partner’s network, in the cloud.

CYBERPOL

CYBERPOL

CYBERPOL's mission is to facilitate the widest possible mutual assistance between all cyber crime law enforcement authorities to help mitigate global cyber threats.

IoTium

IoTium

Secure Cloud Managed Software Defined IoT Networks. IoTium simplifies establishing and managing secure network infrastructure for Industrial IoT.

Zanasi & Partners

Zanasi & Partners

Zanasi & Partners is a security research and advisory company active in the EU and MENA areas. Services focus on technology solutions.

Swiss Cyber Storm

Swiss Cyber Storm

Swiss Cyber Storm is a non profit organization hosting the international Swiss Cyber Storm Conference and running the Swiss part of the European Cyber Security Challenges.

LinOTP

LinOTP

LinOTP is an enterprise level, innovative, flexible and versatile OTP-platform for strong authentication.

IoT Defense

IoT Defense

IoT Defense (IOTD) is a cybersecurity and networking company building solutions that enable the protection of networks and the ever-increasing prevalence of IoT devices.

XPO IT Services

XPO IT Services

XPO IT Services are dedicated to providing secure, high quality IT recycling and asset disposal services.

Innovasec

Innovasec

Innovasec provide information security consulting and training services.

YesWeHack

YesWeHack

YesWeHack offers companies an innovative approach to cybersecurity with Bug Bounty (pay-per-vulnerability discovered) to identify and report vulnerabilities in their systems.

AUREA Technology

AUREA Technology

The photon counter SPD_OEM_NIR from AUREA Technology is designed for quantum key distribution at telecom wavelengths.

Netstar

Netstar

Netstar is an IT Support company based in Central London providing fully managed IT Support, Cyber Security and Technology Consulting services.

FourNet

FourNet

FourNet is an award-winning provider of cloud and managed services; we work closely with our clients to enable digital transformation across their organisation.

Verichains

Verichains

Verichains Lab is a pioneer and leading APAC blockchain security firm with extensive expertise in the areas of security, cryptography and core blockchain technology.

Emerge Digital

Emerge Digital

Emerge Digital is a technology and digital innovation business and Managed Services Provider providing solutions to SMEs.

LegalByte

LegalByte

LegalByte is a leading provider of comprehensive legal and forensic services dedicated to addressing the complex challenges of the digital age.