FREE TO VIEW


« Back to News

2019-09-30

Organised Social Media Manipulation

The use of computational propaganda to shape public attitudes via social media has become main-stream, far beyond the actions of a few bad actors.

2019-09-28

Huawei Will Sell Its 5G Know-How

Huawei wants to address the widespread concerns over the integrity of its 5G network technology by licensing it to EU and US competitors.

2019-09-26

Old Magecart Domains Come Back To Life

A consortium of malicious hacker groups who target online shopping cart systems known as Magecart are repurposing some old tools.

2019-09-25

Effective Cybersecurity Requires Both Cyber Training & Insurance Cover

A Belt & Braces Approach: Organisations can't rely an a firewall to keep out criminals. It takes proper training reinforced with good cyber insurance.

2019-09-25

Attack On Ukraine's Power Grid Targeted Transmission Stations

Crash Override: The experts at Dragos have recreated the 2016 attack timeline which knocked out the power supply to Ukraine's capital city.

2019-09-25

5G Needs A New Generation Of Security

5G networks can deliver much more data much faster, dramatically raising the stakes for ensuring the security & reliability of mobile communications.

2019-09-24

Thomas Cook In A Cyber Collapse

The 150,000 holiday-makers stranded by the failure of Thomas Cook are at risk of a wave of online fraud as they make their way home.

2019-09-24

Who’s Afraid Of Huawei?

Understanding the 5G Security Concerns: Can the risks of using the Chinese tech giant's mobile network technology be mitigated?

2019-09-24

Cyber Security Does Not Follow From Cyber Awareness

The Singapore Cyber Security Agency says that its not just a lack of awareness that renders organisations vulnerable, it is also complacency.

2019-09-27

AI Is Changing The Cyber Security Landscape

Artificial Intelligence can be used to detect and prevent attacks before they take place, but it can also be a double-edged sword.

2019-09-23

US Sanctions Against N. Korean Hacking Groups

Three hacking groups stand accused of stealing possibly hundreds of millions of dollars from financial institutions around the world.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

SealPath

SealPath

SealPath enables companies to protect and control their documents wherever they are: In their PC, in their corporate network, on a partner’s network, in the cloud.

The Hacker News (THN)

The Hacker News (THN)

THN is a leading source for Information Security, Hacking News, Cyber Security, Network Security with in-depth technical coverage of issues and events

Security Magazine

Security Magazine

Security, the business magazine for security executives, focuses on management issues facing top security professionals and effective solutions being employed, both physical and cyber.

CERT-FR

CERT-FR

CERT-FR is the French national government computer security incident response team.

Actiphy

Actiphy

Actiphy provides a tried and proven backup and disaster recovery software solution to ensure business continuity at all times.

AdaptiveMobile Security

AdaptiveMobile Security

AdaptiveMobile Security, a world leader in mobile network security, protecting more than 2.2 billion subscribers worldwide.

Magtech Solutions

Magtech Solutions

Magtech Solutions is a one-stop IT Solutions provider offering Cloud Computing, IT Security, Unified Email Solutions and ERP systems.

Hellenic Accreditation System (ESYD)

Hellenic Accreditation System (ESYD)

ESYD is the national accreditation body for Greece. The directory of members provides details of organisations offering certification services for ISO 27001.

GulfTalent

GulfTalent

GulfTalent is the leading job site for professionals in the Middle East and Gulf region covering all sectors and job categories, including cybersecurity.

Gallarus Industry Solutions

Gallarus Industry Solutions

Gallarus leads innovation within industrial Manufacturing, Production and Management Systems, including Cyber Security solutions specifically developed to protect against the latest cyber criminality.

FifthDomain

FifthDomain

We are a specialist cyber security education and training company tackling the global cyber security skills shortage.

AaDya

AaDya

AaDya provide smart, simple, affordable and effective cybersecurity software solutions for small and medium businesses.

Skudo

Skudo

Skudo is dedicated to creating innovative best-in-class solutions that protect data exchange with the highest level of security and privacy.

Computer Services Inc (CSI)

Computer Services Inc (CSI)

CSI is a leading fintech, regtech and cybersecurity solutions partner operating at the intersection of innovation and service.

Babble

Babble

Babble is a Unified Comms, Contact Centre and Cyber Solutions provider. We believe in making next-generation technology simple to use, deploy and manage.

ANSSI Burkina Faso

ANSSI Burkina Faso

ANSSI is responsible for managing the security of information systems and cyberspace in Burkina Faso.