News

2018-12-18

Three Ways Facebook Could Clean Up Its Act

Facebook, Twitter and other social media companies are causing society-wide damage. Here are three ideas to reduce the harm they do.

2018-12-14

Edward Snowden Calls For Google To Stay Out Of China

Edward Snowden adds his voice to human rights groups asking Google to back out of its plans to launch a censored search engine in China.

2018-12-17

Insurance: Common Cyber Security Myths

We look at the myths around cyber insurance and ask the million-dollar question: can your business afford not to have it?

2018-12-13

Hackers Step Out Of The Shadows With Bigger, Bolder Attacks

Stealth and secrecy used to be the hallmarks of cyber warfare. But increasingly, cyber attacks are now carried out in full public view.

2018-12-14

Indian Government To Provide Handbook On Cyber Safety To School Children

The booklet on cyber safety for teenagers tries to address the increased use of smartphones, gadgets, online gaming and social media.

2018-12-13

Supply Chain Attacks Are On The Rise

Third-party vendors and suppliers are insiders too. They need to be included in the corporate Insider threat Program. By Marcell Gogan

2018-12-14

Top 8 Most Disturbing Data Breaches In 2018

Take a closer look at some of the major 2018 data breaches and discover why they happened. By Marcell Gogan

2018-12-11

British Telecom Is Stripping Huawei Out Of Its Network

BT is to strip all Huawei equipment from its core 4G network and prevent the Chinese equipment vendor from bidding for core 5G network contracts.

2018-12-14

Waymo Is First With Driverless Car Service

Waymo is reportedly planning to launch the world’s first commercial driverless car service this month (December 2018).

2018-12-18

Cyber Weapons Are Proliferating Beyond Control

Cybersecurity is quickly moving beyond the pure financial impact to concerns over public safety, national security and even cyberwarfare.

2018-12-12

Cybercrime Is The Biggest Evolving Source Of Crime In The UK

The capability to investigate cybercrime is one of the top challenges, particularly crime involving botnets, DDoS and malware.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Advent IM

Advent IM

Advent IM is one of the UK’s leading independent cyber security specialists, with a unique approach to providing holistic security management solutions.

Security Research Labs (SRLabs)

Security Research Labs (SRLabs)

Security Research Labs is a Berlin-based hacking research collective and consulting think tank.

Digital Detective

Digital Detective

Digital Detective offer a range of products and services for digital forensic analysis and advanced data recovery.

Optimal IdM

Optimal IdM

Optimal IdM is a leading global provider of identity management solutions and services.

BehavioSec

BehavioSec

BehavioSec uses the way your customers type, swipe, and hold their devices, and enables them to authenticate themselves through their own behavior patterns.

TI Safe

TI Safe

TI Safe provide cybersecurity solutions for industrial networks of main critical infrastructures in Latin America.

DeviceAssure

DeviceAssure

DeviceAssure enables organizations to reliably identify counterfeit and non-standard devices with a real-time check on a device's authenticity.

Intuity

Intuity

The Intuity suite of services provides companies with a complete awareness of their security status and helps them in an efficient, efficient and sustainable improvement process.

iosiro

iosiro

iosiro was created to guide companies through securely using blockchain technologies. We help teams launch and manage ICOs, deploy secure dApps, and integrate private networks into business practices.

Softcat

Softcat

Softcat offer a broad portfolio of IT services and solutions covering Hybrid Infrastructure, Cyber Security, Digital Workspace and IT Intelligence.

BreachLock

BreachLock

Breachlock delivers the most comprehensive Penetration Testing as a Service (PtaaS) powered by Certified Hackers and AI.

CyberHunter Solutions

CyberHunter Solutions

CyberHunter is a leading website security company that provides penetration testing, Network Vulnerability Assessments, cyber security consulting services to prevent cyber attacks.

DoControl

DoControl

DoControl gives organizations the automated, self-service tools they need for SaaS applications data access monitoring, orchestration, and remediation.

D.med Software

D.med Software

D.med Software is a company with a focus on cybersecurity for embedded software and cloud applications for the medical industry.

Leo CybSec

Leo CybSec

Leo CybSec unites a group of Cyber Security experts with 20+ years of collective expertise to help our clients realise and mitigate the cyber challenges and risks facing their business.

Zeus Cloud

Zeus Cloud

Zeus Cloud provide clients with world-class web hosting services to businesses both big and small.