News

2019-07-29

One Costly Minute Of Cybercrime

Cybercriminals cost the global economy $2.9 million every minute last year, a total of $1.5 trillion according to RiskIQ's 'Evil Internet Minute'.

2019-07-29

Russia Hacked All US State Election Systems

Two years after the Presidential election, it turns out Russian hackers focused on voter registration systems and databases, not voting machines.

2019-07-29

Lancaster University Hit By Data Thieves

Lancaster University has suffered a sophisticated and malicious phishing attack which has resulted in breaches of student and applicant data.

2019-07-26

Cyberwar: Covert Cyber Attack Campaign Is Underway

A M.East cyberwar is running at full speed. Networks are being probed, weaknesses and vulnerabilities tested, offensive actions planned.

2019-07-26

Business Is Starting To Believe That AI Is The Best Defence

Two thirds of organisations acknowledge that they will not be able to respond to the next generation wave of critical threats without AI.

2019-07-25

Cannabis Buyers Are Uniquely Vulnerable To Cyber Attacks

N. America’s emerging cannabis industry, along with many of its customers, could be especially vulnerable to hackers and extortion.

2019-07-25

Cyber Criminals Are Targeting Latin America

As S.American companies and governments race to embrace the Internet, cybersecurity and the related risks of cybercrime are being ignored.

2019-07-25

Most Organisations Lack Cyber Resilience

Forget About Protection: Most organisations lack even a clear idea of what their most critical information assets are or where they're located.

2019-07-24

From Ciphers To Cyber Security

One Hundred Years Of Spying: GCHQ celebrates transparency with an exhibition of documents, devices & appliances from the agency's history.

2019-07-24

Business Leaders Are Ignoring Cyber Risks

Cyber-attacks have cost British medium sized businesses with income between £15m and £1bn at least £30bn in the past year.

2019-07-23

Privacy: Can You Trust FaceApp With Your Face?

Smartphone software used to simulate the ravages of time upon users' features is at the centre of a global cybersecurity row over its Ts&Cs.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Grid32

Grid32

Grid32 provides independent computer system and physical security audit services to government and corporate clients of all sizes.

Sonatype

Sonatype

Sonatype protects the world's enterprise software from security, compliance, licensing risks, while reducing application development and deployment time.

InteliSecure

InteliSecure

InteliSecure offer Professional Services, Security Assessments and Managed Services for data and threat protection.

Celestya

Celestya

Celestya is dedicated to providing the most advanced and cost effective systems for human behavior education on cybersecurity awareness training.

Qubitekk

Qubitekk

Qubitekk has developed quantum cryptography solutions for the machine-to-machine (M2M) communications market.

Yaana Technologies

Yaana Technologies

Yaana is a leading provider of intelligent compliance solutions including lawful interception, data retention & disclosure, and advanced security analytics.

Red Sift

Red Sift

Red Sift is the only integrated cloud email and brand protection platform, supporting organizations to secure their communications.

NSO Group

NSO Group

NSO Group develops technology that enables government intelligence and law enforcement agencies to prevent and investigate terrorism and crime.

ICT Reverse

ICT Reverse

ICT Reverse is one of the UK’s leading, fully accredited providers of ICT asset disposal and secure data erasure.

Mphasis

Mphasis

Mphasis is a leading applied technology services company applying next-generation technology to help enterprises transform businesses globally.

Sylint

Sylint

Sylint is an internationally recognized cyber security and digital data forensics firm with extensive experience discretely addressing some of today’s biggest cyber breaches.

Infosys

Infosys

Infosys is a global leader in consulting, technology and outsourcing solutions.. Services include IT strategy, technical architecture and operations including cybersecurity.

Minorities in Cybersecurity (MiC)

Minorities in Cybersecurity (MiC)

MiC was developed out of a unique passion to help fill the gap that exists in the support and development of women and minority leaders in the cybersecurity field.

Phylum

Phylum

Phylum provides powerful, automated software supply chain risk analysis that protects organizations, defends developers and enables secure innovation.

Cipher Net Shield

Cipher Net Shield

Cipher Net Shield specializes in secure E-wallet solutions with a strong focus on blockchain and cybersecurity, prioritizing both transaction security and the recovery of lost capital.

InfoTrust

InfoTrust

InfoTrust is a leading specialised cybersecurity practice that combines a customer-first consulting approach with next-generation security solutions.