News

2018-06-01

N Korean Cyber Attacks Continue Despite Peace Talks

Experts see an intensification in the level of cyber attacks from N Korea in the build up to talks with S Korea and the US on de-nuclearisation.

2018-05-31

Quantum Computing - What You Should Know

As conventional computing technology matures and with an insatiable demand for more power, there is a growing interest in quantum computing.

2018-06-01

Countering Electoral Interference

Russia’s campaign targeting the 2016 US election shows the how deeply democratic processes can be undermined using communications technology.

2018-05-31

FBI Seizes Control Of Russian Botnet

FBI agents have seized control of a key server in the Kremlin’s global botnet of 500,000 hacked routers, allowing the victims to be identified.

2018-05-30

GDPR - More People Will Share Data

One effect of GDPR will be to increase consumer confidence, making users more likely to share personal data with organisations they trust.

2018-05-30

Denmark Under Attack

Two out of three businesses surveyed have been on the receiving end of cyber-attacks in the last year, with one in eight of those attacks successful.

2018-05-30

A Cyber Attack Could Cripple The UK

The chief of British military intelligence makes a rare public statement warning of the UK's vulnerability to a major cyber attack.

2018-05-30

Mexican Bank Hack Led To A Cash Flight

Several Mexican banks have experienced large cash withdrawals after possible cyber attackers infiltrated the central bank payments system.

2018-05-29

Is The US Heading Toward A Cashless Economy Via Blockchain?

The banking industry is starting to believe it's only a matter of time before central banks adopt a form of digital currency that looks like Bitcoin.

2018-05-29

Business Cyber Security Strategy

The Corporate Board is ultimately accountable for the protection of corporate systems and they need to develop a robust cyber security policy. (£)

2018-05-29

Business Cyber Security Strategy

The Corporate Board is ultimately accountable for the protection of corporate systems and they need to develop a robust cyber security policy.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Indemnity Solutions (CIS)

Cyber Indemnity Solutions (CIS)

CIS is an InsurTech company focused on licensing innovative cyber risk insurance solutions to the global insurance industry.

Kernelios

Kernelios

Kernelios is a simulator-based training center and an incubator for cyber experts worldwide.

Cyber Senate

Cyber Senate

Cyber Senate is dedicated to bringing Operators of Essential Services together with global subject matter experts to address the challenges of evolving cyber threats to critical infrastructure.

SBS CyberSecurity

SBS CyberSecurity

SBS CyberSecurity is a premier cybersecurity consulting and audit firm.

Cyber Triage

Cyber Triage

Cyber Triage is an automated incident response software any company can use to investigate their network alerts.

Arctic Wolf Networks

Arctic Wolf Networks

Arctic Wolf Networks delivers the industry-leading security operations center (SOC)-as-a-service that redefines the economics of cybersecurity.

Ultratec

Ultratec

Ultratec provide a range of data centric services and solutions including data recovery, data erasure, data destruction and full IT Asset Disposal (ITAD).

CHEQ

CHEQ

CHEQ provides fully autonomous, preemptive technology for brand safety and ad-fraud prevention.

Cyber Risk Aware

Cyber Risk Aware

Cyber Risk Aware provide a security awareness and phishing simulation platform that focuses on real threats and educates and empowers employees to be the first line of defence.

Polaris Infosec

Polaris Infosec

Polaris Web Presence Protection (WPP) is powered by our proprietary artificial intelligence and machine learning engine to ensure that attacks are stopped before they affect your business.

CyberSheath Services International

CyberSheath Services International

CyberSheath integrates your compliance and threat mitigation efforts and eliminates redundant security practices that don’t improve and in fact might probably weaken your security posture.

Squad

Squad

Squad provides leading expertise to ensure protection against the most complex cyber threats. Combining the best practices of DevOps and Cybersecurity, we are committed to create a secured cyber space

Millennium Corporation

Millennium Corporation

For nearly two decades, Millennium Corporation has been operating on the leading edge of cybersecurity.

Netcraft

Netcraft

Netcraft is a global leader in cybercrime detection and disruption, combining cutting-edge technology with decades of experience to protect organizations of all sizes from digital threats and attacks.

Astreya

Astreya

Astreya is the leading IT solutions provider for some of the world's most recognizable and innovative organizations.

StealthMole

StealthMole

StealthMole is a deep and dark web threat intelligence company that delivers a cloud-based, unified platform for digital investigation, risk assessment, and threat monitoring.