News

2022-05-25

Satellite Systems Security Needs To Be Reinforced Against Cyber Attack

Cyberspace is the 'soft underbelly' of satellite communications systems and the real vulnerabilities exist on the ground rather than in space.

2022-05-24

Cyber Attacks On Ukraine Step Up The Pressure

Russia's cyber offensive against Ukraine continues with malware attacks and misinformation. Russia's own citizens are also being targeted.

2022-05-24

Vishing Attacks Reach All Time High

Vishing (voice phishing) cases have increased almost 550 percent over the last twelve months with hundreds of thousands of cases detected.

2022-05-24

Clearview Pays £7.5m For Illegally Storing Facial Images

Facial recognition company Clearview AI has been fined £7.5m by the British regulator and told to delete the data of British residents that it holds.

2022-05-23

European Union Agrees New Cyber Security Legislation

NIS 2: The EU has reached agreement on new legislation to impose common cyber security standards on critical EU industry sectors.

2022-05-23

CISA Detect Vulnerabilities In VMWare Products

Random Disconnection: CISA says unpatched VMWare devices should be considered to be compromised and need to be urgently checked.

2022-05-23

Canada Bans China From Its 5G Networks

Canada's telecoms operators are no longer allowed to use Huawei & ZTE gear. Those that have already installed their equipment must remove it. 

2022-05-23

Personal Data Of Two Million Texans Left Exposed For Years

Social Security numbers, addresses, dates of birth, phone numbers and other personal information exposed to anyone who knew how to find it.

2022-05-19

Conti Attack US Precision Engineering Business

A leading maker of aerospace systems has confirmed that it was hit by hackers, who then exposed employees’ personally identifiable information. 

2022-05-19

Never Trust Anything Again - The Zero Trust World

Organisations must abandon the ‘trust everything, but verify’ approach. Never trust. Always verify. Continuously monitor. By Colin Tankard

2022-05-18

A Short History Of Cyber Crime - Part 1- Its Motivations

Cyber crime is human criminal behavior but amplified, empowered & delivered with unprecedented power and greater opportunity for concealment.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Galaxkey

Galaxkey

Galaxkey is a data protection product that protects email, documents and any data using access control and an encryption platform.

softScheck

softScheck

softScheck is an IT security consultancy. Services range from pentesting and compliance testing to security auditing of software and IT infrastructure.

Fortress Group

Fortress Group

Fortress is specialized in confidential and discrete recruitment solutions and temporary staffing in the field of security and risk management.

Secret Double Octopus

Secret Double Octopus

Secret Double Octopus offers the world’s only keyless multi-shield authentication technology for users and things.

NSO Group

NSO Group

NSO Group develops technology that enables government intelligence and law enforcement agencies to prevent and investigate terrorism and crime.

CyberFortress

CyberFortress

CyberFortress is an insuretech startup offering a new kind of online business interruption policy designed for small business.

Utility Cyber Security Forum

Utility Cyber Security Forum

The Utility Cyber Security Forum offers a focused venue in which utility executives can network one-on-one with colleagues facing issues in protecting against cyber attacks.

astarios

astarios

astarios provide near-shore software development services including secure software development (DevSecOps), quality assurance and testing.

Nokia

Nokia

Nokia is a proven leader in fixed, mobile and IoT security offering capabilities that range from systems design to integration and support.

Kentik

Kentik

Kentik - one platform for Network Visibility, Performance, and Security.

Enso Security

Enso Security

Enso is the first Application Security Posture Management (ASPM) solution, helping security teams everywhere eliminate their AppSec chaos with application discovery, classification and management.

Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

SEEDS conducts research and develops innovative cybersecurity technologies, tools, and methodologies that advance the energy sector’s ability to survive cyber incidents.

European Center for CyberSecurity in Aviation (ECCSA)

European Center for CyberSecurity in Aviation (ECCSA)

ECCSA is a cooperative partnership within the aviation community to better understand emerging cybersecurity risks in aviation and provide collective support in dealing with cybersecurity incidents.

LocateRisk

LocateRisk

LocateRisk provides more efficiency, transparency and comparability in IT security with automated, KPI-based IT risk analyses.

PCCW Global

PCCW Global

PCCW Global is a leading communications service provider, offering mobility, voice and data solutions to multinational enterprises, telecomms partners, cloud and application service providers.

Beetles Cyber Security

Beetles Cyber Security

Beetles is a crowdsourced penetration testing platform designed to build a trusted, hacker-centric approach to protectan organization’s digital attack surface.