News

2019-03-26

US Cyber Command Can Cut Russian Troll Access

A US military agency successfully blocked the Internet access of a Russian firm believed to be trying to influence the 2018 US midterm elections.

2019-03-26

Cyber Criminals Are Changing Their Methods

Increased security measures and awareness are driving cyber-criminals to alter their techniques in search of a better return on investment.

2019-03-26

US Surveillance System Exposed By Snowden Goes Dormant

A US surveillance programme whose forerunner was exposed by Edward Snowden has not been used for six months and is unlikely to be renewed.

2019-03-25

Half Of UK Businesses Have Fallen For Phishing Attacks

Phishing emails are a common attack technique deployed in hacking campaigns which attempt to lure victims into disclosing sensitive information.

2019-03-25

Three In Five Politicians’ Websites Don’t Use Cyber Security

A wide survey of politicians' websites across 37 countries finds that over 60% lack basic security measures.

2019-03-25

The US Navy Is Leaking Secrets

The US Navy is aware of cyber-attacks by foreign hackers but has failed to effectively respond or to warn its defense contractors of the danger.

2019-03-25

WordPress Comprises 90% Of Hacked Sites

WordPress accounts for the vast majority of compromised CMS platforms, with vulnerable plugins the prime attack vector.

2019-03-23

Bank of England Testing Banks' Cyber Resilience

Britain's banks will have to show they could recover from a cyber-attack within hours to avoid customer payments being delayed.

2019-03-21

Qbot Banking Malware Can Infect Cybersecurity Firms

A new variant of a banking malware known as Qbot rapidly mutates to stay ahead of anti-virus systems, even infecting some technology vendors.

2019-03-20

Knowing How Your Data Behaves Is The Key To Cybersecurity

Data is everywhere, however, securing that data has never been more critical, or more difficult. This means we need a new approach to security.

2019-03-20

Car Hacking & Data Collection

The amazing driver-assist mechanisms and must-have infotainment systems in many new cars are raising big concerns about safety and privacy.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

PortSwigger

PortSwigger

PortSwigger's Burp Suite is an integrated platform for performing security testing of web applications.

Recorded Future

Recorded Future

Recorded Future arms security teams with threat intelligence powered by patented machine learning to lower risk.

Plixer

Plixer

Plixer delivers a network traffic analytics system used for monitoring, visualization, and reporting of network and security incidents.

GeoLang

GeoLang

GeoLang’s Ascema platform protects sensitive information at the content level by identifying, classifying and tracking data across the corporate infrastructure.

Smokescreen

Smokescreen

Smokescreen's IllusionBLACK employs deception technology to detect, deflect and defeat advanced hacker attacks.

Tempered Networks

Tempered Networks

Tempered Networks delivers the first purpose-built platform for IIoT cybersecurity that allows customers to connect and secure devices in minutes without the need for specialized skills.

Prescient

Prescient

Prescient’s Cyber solutions supplement your firm’s existing data security infrastructure with specialized investigations that identify unconventional cyber risks.

Identity Defined Security Alliance (IDSA)

Identity Defined Security Alliance (IDSA)

IDSA is a group of identity and security vendors, solution providers and practitioners that acts as an independent source of education and information on identity-centric security strategies.

Consortium for Information & Software Quality (CISQ)

Consortium for Information & Software Quality (CISQ)

The mission of CISQ is to develop international standards for software quality and to promote the development and sustainment of secure, reliable, and trustworthy software.

Absolute IT Asset Disposals

Absolute IT Asset Disposals

Absolute IT Asset Disposals is an IT asset disposal (ITAD) company providing safe and secure recycling of IT assets.

Curtail

Curtail

Curtail keeps businesses running by using live traffic analysis to identify defects before software goes live, and detect and isolate security threats before they impact systems.

SAFECode

SAFECode

SAFECode is a global industry forum where business leaders and technical experts come together to exchange insights on creating, improving, and promoting effective software security programs.

BOXX Insurance

BOXX Insurance

BOXX Insurance Inc. is a new type of insurance company for a new type of risk. Cyberboxx is the first fully-integrated cybersecurity and insurance solution for small-to-medium-sized businesses.

GrayMatter

GrayMatter

GrayMatter provides Advanced Industrial Analytics, OT Cybersecurity, Digital Transformation and Automation & Control services to clients across the U.S. and Canada.

Drumz

Drumz

Drumz plc is an investment company whose investing policy is to invest principally but not exclusively in the technology sector within Europe.

ANSSI Burkina Faso

ANSSI Burkina Faso

ANSSI is responsible for managing the security of information systems and cyberspace in Burkina Faso.