News

2019-05-15

Cyber-Attacks On Maritime Oil Tankers

Four oil tankers and a pipeline attacked near the Strait of Hormuz, using a combination of armed drones and GPS spoofing navigation software.

2019-05-15

Britain To Initiate Online “Porn Ban’

The UK government intends to implement a “Porn Ban” nationwide on July 15, restricting access to online pornography for under 18s. But will it work?

2019-05-14

WhatsApp Penetrated By Spyware

Hackers have installed surveillance software on phones and other appliances exploiting a major weakness in Facebook’s WhatsApp messenger.

2019-05-14

Fake News Ahead Of EU Elections

The EU is experiencing a surge in information warfare in an attempt to sway the outcome of elections later this month.

2019-05-17

What's Your Data Strategy?

All businesses need a Data Strategy which encompasses audits, reviews their security, data protection & employee cyber awareness training.

2019-05-22

Hackers Don't Only Target Big Business

Specialist Insurers Hiscox find that hackers are shifting focus from larger companies and that SMEs are now equally vulnerable.

2019-05-22

Verizon 2019 Data Breach Report

No matter what defensive security measures are put in place, attackers can get through. Verizon's latest Data Breach Report confirms the problem.

2019-05-17

‘Chinese Spies’ Had NSA Cyber Weapons Before The Shadow Brokers Leak

Chinese spies obtained NSA cyber weapons more than a year before they were leaked in one of the most high-profile hacks of the last decade.

2019-05-16

AI In Cyber Security Is Worth Almost $5B

The surge of cyber attacks is one of the prime growth factors behind the AI-driven cyber security market, currently valued at $4.94B.

2019-05-21

Young Hacker Makes $1m. Legally.

It Pays To Be Ethical: A 19-year-old Argentinian has made history as the first to earn over $1,000,000 in bug bounty awards.

2019-05-21

Israel Hits Back At Hamas Cyber Attackers

As more details emerge, it is thought to be the first instance of retaliation with physical military action in real time against a cyber-attack.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Identiv

Identiv

Identiv is a global security technology company that establishes trust in the connected world, including premises, information and everyday items.

it-sa 365

it-sa 365

it-sa 365 is a digital platform for connecting IT security vendors and experts with those who bear responsibility for IT security in management and technology.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Norton

Norton

NortonLifeLock is dedicated to helping secure the devices, identities, online privacy, and home and family needs of approximately 50 million consumers.

Center for Cyber Safety and Education

Center for Cyber Safety and Education

The Center for Cyber Safety and Education works to ensure that people across the globe have a positive and safe experience online through our educational programs, scholarships, and research.

Aujas Cybersecurity

Aujas Cybersecurity

Aujas has deep expertise and capabilities in Identity and Access Management, Risk Advisory, Security Verification, Security Engineering, & Managed Detection and Response services.

NSW Cyber Security Innovation Node

NSW Cyber Security Innovation Node

NSW Cyber Security Innovation Node is part of a national network designed to foster and accelerate cyber capability and innovation across Australia.

Orchestra Group

Orchestra Group

Orchestra Group offer a unique integrated cybersecurity defense platform with proactive security policy management and enforcement orchestration.

Nokia

Nokia

Nokia is a proven leader in fixed, mobile and IoT security offering capabilities that range from systems design to integration and support.

iSolutions

iSolutions

iSolutions is an official reseller and engineering company of leading products and solutions for cybersecurity and information protection, optimization, visualization and control of applications

Krypsis

Krypsis

Krypsys is an information security company with a focus on helping you defend your information and data against emerging security threats.

Kontex

Kontex

Kontex is a Cyber Security consultancy creating resilient solutions. From Strategy, Advisory and Implementation to Management and everything in between.

Input Output (IOHK)

Input Output (IOHK)

IOHK is one of the world's pre-eminent blockchain infrastructure research and engineering companies.

Aikido Technology Services

Aikido Technology Services

Aikido Technology Services is a leading-edge technology solutions provider, servicing the Pacific North West USA. We offer affordable IT solutions designed to streamline and secure your business.

J.S. Held

J.S. Held

J.S. Held is a global consulting firm providing technical, scientific, and financial expertise across all assets and value at risk.

Castlepoint Systems

Castlepoint Systems

Castlepoint Systems is a pioneer in information governance, risk and compliance as a service. An all-in-one solution offering powerful risk management, built in compliance, cybersecurity and audit.