NEWS > Cybersecurity News


« Back to News

2015-05-12

UK’s Internet Bandwidth Could Soon Be Choked

Current optical cable and switches will reach their capacity for data throughput by 2020.

2015-05-08

How Mobility Is Revolutionising Manufacturing

Ten ways that mobilisation is going to dramatically change manufacturing industry.

2015-05-04

Deloitte Mock a Cyberattack to Teach Business How to Respond

A security breach or big data loss can trigger an emergency for the entire business.

2015-05-04

'Killer Robots' Offer Both Risks & Advantages for Military Use

Policy analysts in Canada are grappling with limits on the military use of robots.

2015-05-06

Anonymous Hackers Taking On the Kremlin

Anonymous International release an online archive of around 40,000 text messages belonging to a powerful Kremlin official.

2015-05-06

UK Rail Signals Can Be Hacked To Cause Crashes

Rogue employee could hack the new rail system and cause a crash.

2015-05-05

Locked Shields: NATO Holds Major Cyber-Security Drill

The largest NATO cybersecurity exercise ever is underway.

2015-05-06

Russian Hackers Have Been Reading Obama’s Emails

The White House’s unclassified computer system has been breached by Russian hackers.

2015-05-07

Cybersecurity Policies for the Insurance Industry

US NAIC holds the first large scale multi-state examination of insurers' cybersecurity practices.

2015-05-04

US Defense Secretary Defines New Cybersecurity Strategy

US Department of Defense's new cybersecurity strategy includes a "renewed partnership" with the technology industry.

2015-05-04

Banking on A Spy: GCHQ Chief to Fight Bank Cybercrime

Standard Chartered Hire New Security Chief From GCHQ.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Venafi

Venafi

Venafi is a world-class cyber-security company dedicated to protecting machine identities for our hyper-connected digital economy.

London Office for Rapid Cybersecurity Advancement (LORCA)

London Office for Rapid Cybersecurity Advancement (LORCA)

LORCA's mission is to support the most promising cyber security innovators in growing solutions to meet the most pressing industry challenges and build the UK’s international cyber security profile.

Infosec (T) Ltd

Infosec (T) Ltd

Infosec (T) Limited is an independent Tanzania based consultancy specializing in IT governance, information security and IT audit.

Kymatio

Kymatio

Kymatio are pioneers in Artificial Intelligence applied to adaptive staff strengthening, cultural change and predictive internal risk analysis.

Upfort

Upfort

Upfort (formerly Paladin Cyber) unifies award-winning security and robust cyber insurance to deliver comprehensive cyber risk solutions.

Systems Assessment Bureau (SAB)

Systems Assessment Bureau (SAB)

Systems Assessment Bureau is an internationally recognized ISO Certification Body with a unique vision of “Excel together with global standards”.

Voodoo Security

Voodoo Security

Voodoo Security is a specialized information security consulting firm focused on security assessments, risk and compliance analysis, and cloud security.

LocateRisk

LocateRisk

LocateRisk provides more efficiency, transparency and comparability in IT security with automated, KPI-based IT risk analyses.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Rootshell Security

Rootshell Security

Rootshell Security is transforming vulnerability management with its vendor-agnostic Prism Platform and industry-leading offensive security assessments.

Mercury Systems

Mercury Systems

Mercury Systems is the leader in making trusted, secure mission-critical technologies profoundly more accessible to aerospace and defense.

Insurica

Insurica

INSURICA is a full-service insurance agency built upon a tradition of integrity, industry leadership, and excellence.

Zluri

Zluri

Zluri is a cloud-native SaaSOps platform enabling modern enterprises with SaaS Management and Identity Governance.

APIsentry

APIsentry

APIsentry is a leading provider of comprehensive API security solutions, specializing in protecting organizations from a wide range of cyber threats targeting their Application Programming Interfaces.

GovSky

GovSky

GovSky streamlines CMMC compliance, saving time and significantly reducing cost.