FREE TO VIEW


« Back to News

2018-11-09

Microsoft Wants To Work with Trump & Congress On Cybersecurity

Bipartisan: Despite a newly divided US Congress, Microsoft is looking for ways to create a global force-field against cybersecurity threats.

2018-11-09

USB Devices Pose A Significant Threat To Industrial Facilities

Removable USB media devices pose a significant and intentional cyber threat to a wide array of industrial process control networks.

2018-11-08

Iran Admits To Being Hit By Cyber Attack

Iran’s strategic infrastructure networks have reportedly come under an extensive and powerful cyber-attack. Who would do that?.

2018-11-09

How To Avoid Facebook Phishing Scams

Criminals use a variety of methods to target Facebook users, but phishing scams are the most dangerous and potentially damaging.

2018-11-12

How Did Iran Find CIA Spies? They Googled It!

A covert channel used for communicating with CIA sources was exposed and infiltrated by Iranian intelligence in 2009.

2018-11-12

China Has “taken the gloves off” In Hacking Attacks

China has upped its hacking game, improving operational security and penetration skills and learning from Russian expertise.

2018-11-08

China May Be Reading Your Emails

Someone in Beijing may be reading your emails before you do, as well as capturing your passwords & personal data from websites you visit

2018-11-07

Why Has The US Not Been Hit With A Devastating Cyber Attack?

Security experts have been warning about a devastating cyber-attack for over a decade. Here are a few theories why it hasn’t occurred… yet.

2018-11-06

Lloyds Bank Is Replacing Customer Debit Cards After Cyber Attacks

Fraud: The UK bank is going to reissue debit cards to all customers that have made purchases on the British Airways and Ticketmaster websites.

2018-11-06

US Homeland Security Warns Of Dangerous SCADA Flaw

ICS-CERT has warned organizations using Advantech’s ICS products to install an update that kills a remotely exploitable flaw.

2018-11-05

Britain Needs A Cyber Army To Defend Against Prolific Attacks

Britain will be wide-open to state-sponsored hacking of its critical infrastructure, because of a shortage of 50,000 cybersecurity specialists.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Lima Networks

Lima Networks

LIMA design and deliver IT Infrastructure solutions and services including managed Security Monitoring services.

Centre for Secure Information Technologies (CSIT)

Centre for Secure Information Technologies (CSIT)

CSIT is a UK Innovation and Knowledge Centre (IKC) for secure information technologies. Our vision is to be a global innovation hub for cyber security.

Infosecurity Europe

Infosecurity Europe

Infosecurity Europe is Europe’s number one information security conference and exhibition.

Engage Black

Engage Black

Engage Black provides solutions for securing and protecting cryptographic keys, data at rest, and data in motion.

IntelliGO Networks

IntelliGO Networks

IntelliGO Networks is a cybersecurity company focused on Managed Detection and Response (MDR).

Panaseer

Panaseer

Panaseer is an enterprise cybersecurity automation and data analytics company that helps organizations stop preventable breaches by ensuring security controls are working effectively.

Ubisecure

Ubisecure

Ubisecure provide Identity & Access Management solutions.

Verint Systems

Verint Systems

Verint is a leader in Actionable Intelligence with a focus on customer engagement optimisation, security intelligence, fraud, risk and compliance.

Boldon James

Boldon James

Boldon James are market leaders in data classification and secure messaging software.

Stealthcare

Stealthcare

Stealthcare is a full service, global cyber security firm offering solutions that educate, empower and protect.

Sternum

Sternum

Sternum provides reliable and effective endpoint security for any IoT device, using robust technology and seamless integration.

Cyentia Institute

Cyentia Institute

The Cyentia Institute is a research & data science firm with a mission to advance knowledge in the cybersecurity industry.

Cyberport

Cyberport

Cyberport is focused on facilitating the growth of major technology trends such as FinTech and cybersecurity as well as the emerging technologies of AI, big data and blockchain.

R3I Ventures - House of DeepTech

R3I Ventures - House of DeepTech

The House of DeepTech is an incubator for deeptech entrepreneurs that are transforming global industries. Areas of interest include cybersecurity.

Traceable

Traceable

Traceable was founded to protect applications from next-generation attacks.

Redington

Redington

Redington offer products and services in solution areas including digital transformation, hybrid infrastructure and cybersecurity.