FREE TO VIEW


« Back to News

2018-11-22

Millennials Are A Threat To Cybersecurity

Nearly 90% of 18–25 year olds break the basic security rules, reusing passwords across different accounts, according to new study from SailPoint

2018-11-22

Chinese Hackers Target UK Engineering

Recent attacks on an engineering company in the United Kingdom were attributed to a China-related cyber-espionage group.

2018-11-21

Industrial Control Systems Are A Soft Target For Cyber Attackers

Improperly protected Internet-connected industrial control systems are vulnerable to attacks that can cause catastrophic harm.

2018-11-19

Cybersecurity Vigilance Is Mandatory

Mobile Devices, Cryptojacking, Botnets and Encrypted Traffic are four key vulnerabilities that security leaders should be focusing on right now.

2018-11-19

South Korea To Triple Investment In Blockchain

The S Korean government will invest $35 million next year’s to develop blockchain technology & related distributed ledger technology.

2018-11-21

Journalists Aim To Detect Deepfakes

Across the media industry, news organisations can consider multiple approaches to help authenticate news stories if they suspect alterations.

2018-11-20

AI For Cyber - You Don’t Need To Know The Threat, Just The Network

AI driven cybersecurity does its work not by hunting viruses but by understanding networks.

2018-11-19

Delay, Deny and Deflect: How Facebook’s Leaders Fought Through Crisis

A bombshell report on Facebook management’s struggles to deal with data breaches, failures to protect privacy and electoral interference.

2018-11-19

Japanese Cybersecurity Minister Does Not Use Computers

The Japanese Government minister in charge of major changes to a key cybersecurity law has admitted he rarely uses a computer.

2018-11-19

AI Is Revolutionising Digital Marketing

With the ability to collect data, analyse it, apply it and then learn from it. ArtificiaI Intelligence is transforming digital strategy for business.

2018-11-22

What Is The GRU & Who Does It Hack?

The GRU is Russia’s Main Intelligence Directorate and officially it doesn’t exist, but its agents are very busy. Who are they and what do they do?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

F5 Networks

F5 Networks

F5 products ensure that network applications are always secure and perform the way they should—anywhere, any time, and on any device.

FlashRouters

FlashRouters

FlashRouters offers DD-WRT compatible router models with improved performance, privacy/security options, and advanced functionality.

Snort

Snort

Snort is an open source intrusion prevention system capable of real-time traffic analysis and packet logging.

SKOUT Secure Intelligence

SKOUT Secure Intelligence

SkOUT Secure Intelligence (formerly Oxford Solutions) provides cyber security monitoring services to organizations around the globe.

Sera-Brynn

Sera-Brynn

Sera-Brynn is one of the highest-ranked, pure-play cybersecurity compliance and advisory firms in the world.

Gallarus Industry Solutions

Gallarus Industry Solutions

Gallarus leads innovation within industrial Manufacturing, Production and Management Systems, including Cyber Security solutions specifically developed to protect against the latest cyber criminality.

Infosec Partners

Infosec Partners

Whether you’re looking for complete managed security or an on-call expert advisor, we offer a range of managed security services to complement your internal team or primary outsource partner.

GELLIFY

GELLIFY

GELLIFY is the first innovation platform dedicated to the high-tech B2B market, supporting start-ups and companies.

OISTE Foundation

OISTE Foundation

OISTE foundation allows users to control their digital identities using well-understood and secure algorithms that ensure the continued validity of an identity and its claims.

Injazat

Injazat

Injazat Data Systems is an industry recognized market leader in the Gulf region for Information Technology, Data Center and Managed Services.

Client Solution Architects (CSA)

Client Solution Architects (CSA)

Client Solution Architects (CSA) is a leading digital transformation consulting firm focused on the U.S. Defense Department and all U.S. Federal enterprise information technology service areas.

Nitrokey

Nitrokey

Nitrokey is the world-leading company in open source security hardware. Nitrokey develops IT security hardware for data encryption, key management and user authentication.

Halogen Group

Halogen Group

Halogen Group is the leading Security Solutions Provider in West Africa. Services encompass Physical Security, Electronic Security, Virtual & Cyber Security, Risk Assessments and Training.

Bittnet Training

Bittnet Training

Bittnet Training is the leader in the IT Training market in Romania. We develop the IT skills of IT professionals as well as those who wish to start a career in IT.

BLOCX

BLOCX

BLOCX is designed to address the ever-growing challenges of managing and securing digital devices, from personal computers to corporate networks.

TrueBees

TrueBees

TrueBees is the first deepfakes detector able to detect AI-generated portraits shared on social media and to prevent their diffusion across the web.