FREE TO VIEW


« Back to News

2019-11-08

Cyber Attack On A Nuclear Power Plant

Despite an initial denial, India's largest Nuclear Power Plant has now confirmed it suffered a malware attack.

2019-11-08

Machines With The Power To Kill

People have quit Google protesting the company's co-operation with the Pentagon on autonomous weapons, which they claim are dangerous.

2019-11-08

On Demand Webinar: How to secure app pipelines in AWS

SANS and AWS Marketplace discuss how to improve and automate security across the CI/CD pipeline and runtime environment. - On Demand -

2019-11-06

Hacking Skills Can Qualify You For A Top Cybersecurity Job

Ethical Hacking: Many security professionals believe hacking is the most important skill and its a great way to break into the cybersecurity industry.

2019-11-06

Reshaping The Future Of War With Malware

As conflict in the Middle East surges, some analyst think that malware can be a useful tool of diplomacy to de-escalate regional conflict.

2019-11-05

Fraud And The Dark Side Of AI

AI-derived algorithms that can create new data from existing datasets are being used by criminals to create convincing deepfakes and steal money.

2019-11-05

Hackers Demand Ransom After Stealing Johannesburg's Data

The attack on South Africa’s financial centre, accounting for 16% of national GDP has delivered a noticeable blow to the country’s economy.

2019-11-04

2020 Will Be A Landmark Year For AI

Ways are being found to fuse Artificial Intelligence with other systems more effectively. Transport, healthcare, finance & cybersecurity are in play.

2019-11-04

Russia Will Try Leaving The Global Internet

Cyber Sovereignty or Virtual Iron Curtain? Russia will test its internal RuNet network to see if the country can function outside the global Internet.

2019-11-04

A £370m Investment To Boost AI In Britain

Big companies, universities and government have combined to invest in artificial intelligence, with a focus on researching applications in Healthcare.

2019-11-01

Cyber Security Training That Employees Don’t Hate

Most employees hate taking cyber security awareness training but it doesn’t have to be that way. There are several ways to help them love it.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Exploit Database (EDB)

Exploit Database (EDB)

The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

CORDIS

CORDIS

CORDIS is the European Commission's primary public repository and portal to disseminate information on all EU-funded research projects and their results.

Agenci

Agenci

Agenci are specialists in cyber security and information security and deliver ISO 27001 Certification.

KnowBe4

KnowBe4

KnowBe4 is an integrated platform for security awareness training combined with simulated phishing attacks.

Alliance for Cyber Security

Alliance for Cyber Security

An alliance of all major players in the field of cyber security in Germany with a mission to strengthen Germany’s resistance to cyber-attacks.

Secure Technology Alliance

Secure Technology Alliance

Secure Technology Alliance is a multi-industry association working to stimulate the adoption and widespread application of secure solutions.

ComCode

ComCode

ComCode provides consulting services and solutions in the area of digitization and cyber security for mid-sized and big businesses.

ID Experts

ID Experts

ID Experts is a leading provider of identity protection and data breach services for companies and individuals throughout the USA.

DAkkS

DAkkS

DAkkS is the national accreditation body for Germany. The directory of members provides details of organisations offering certification services for ISO 27001.

Beazley

Beazley

Beazley are a specialist insurer with three decades of experience in providing clients with the highest standards of underwriting and claims service worldwide.

TES

TES

TES is a provider of IT Lifecycle Services, offering bespoke solutions that help customers manage the commissioning, deployment and retirement of Information Technology assets.

FifthDomain

FifthDomain

We are a specialist cyber security education and training company tackling the global cyber security skills shortage.

Truly Secure

Truly Secure

Truly Secure is an IT Service Provider that ensures greater efficiency and security within a company's technological environment.

Tailscale

Tailscale

Tailscale is a VPN service that makes the devices and applications you own accessible anywhere in the world, securely and effortlessly.

ARC Risk and Compliance

ARC Risk and Compliance

ARC Risk and Compliance is a consulting company comprised of a team of AML Specialists completely focused on anti-money laundering compliance and the technologies used to support compliance programs.

ExactTrak

ExactTrak

ExactTrak provide embedded cyber security solutions for your digital devices – whenever and wherever you need them.