News

2021-05-17

The Next E-Industrial Revolution

Our economic and societal structures have evolved around assumptions that will no longer be valid once technology reaches this milestone.

2021-05-15

Pipeline Ransom Has Been Paid

Darkside hackers have been paid $5 million to restore operations after a ransom attack paralysed fuel supplies across the US Eastern seaboard.

2021-05-13

Stop Taking Risks Online

Here are seven risky online habits you should stop right now, plus advice on better habits that can help keep you and your family safe online.

2021-05-14

Ransomware Attack On Ireland's Health Service

The Irish Health Service Executive has shut down IT systems and cancelled appointments after attempts to access data following a ransom attack.

2021-06-01

Can Ethical AI Become A Reality?

The ethical, social and legal aspects of AI systems must be better understood if the many potential negative consequences are to be avoided.

2021-05-19

Maritime Shipping Is An Ideal Target For Ransom

The maritime industry is dependent on just-in-time supply chains, often with outdated technology, making an attractive target for cyber criminals.

2021-05-25

Google Plans To Eradicate Cookies

Regulators and rivals are suspicious of Google’s disruptive plan to rewrite the rules of online advertising in the name of protecting user privacy.

2021-05-25

Cyber Security For Small Business

Blok: A specialist new cyber security service provider is to focus on cyber criminals who target small businesses and the self-employed.

2021-06-03

Vodafone Using Google Cloud To Retain Customers

Vodafone is working with Google on a public cloud-based CRM platform that will share their user data internationally. How secure is that?

2021-06-02

Spies Are Being Made Redundant By Technology

Human spies are becoming redundant and being replaced by technology. Soon, the Internet of Things will become the new 007 (£).

2021-06-03

Electronic Espionage Will Use AI Instead Of Spies

The British spy agency GCHQ has produced a roadmap for how they intend to make ethical use Artificial Intelligence to replace human operatives.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Ionic Security

Ionic Security

Ionic provide a high-assurance data protection and control platform built on strong encryption, fine-grain control and contextual analytics.

IS Decisions

IS Decisions

IS Decisions builds affordable and easy-to-use Access Management software solutions, allowing IT teams to effectively secure access to Active Directory infrastructures, SaaS apps and data within.

972VC

972VC

972VC was created to help entrepreneurs find potential funding for their startups. Your guide to the Israeli startup funding ecosystem.

Internetwork Defense (IND)

Internetwork Defense (IND)

Internetwork Defense is a premier provider of Information Security Training and Business Consulting Services in the Mid-Atlantic region.

Pivot Point Security

Pivot Point Security

Pivot Point Security is a trusted leader in information security consulting. We help clients master their information security management systems.

SilverSky

SilverSky

SilverSky offers a comprehensive suite of products and services that deliver unprecedented simplicity and expertise for compliance and cybersecurity programs.

Teleport

Teleport

Teleport is a remote-first technology company. We enable engineers to quickly access any computing resource anywhere on the planet.

Hexens

Hexens

Hexens introduces a whole new approach to cybersecurity solutions. Indisputable skills and a unique super-focused perspective on every single case are the values we create.

Catalogic Software

Catalogic Software

Catalogic helps clients backup, recover, manage, and protect their data across their enterprise and cloud environments with Smart Data Protection solutions.

Guardsman Cyber Intelligence (GCI)

Guardsman Cyber Intelligence (GCI)

GCI provides proven cyber intelligence solutions to protect your business against ever present physical and digital threats shadowing your online business.

Binarii Labs

Binarii Labs

Binarii are focused on helping enterprises to design and deploy SaaS solutions that utilise DLT (Digital Ledger Technology) effectively, efficiently and sensibly.

CyberSecureRIA

CyberSecureRIA

We founded CyberSecureRIA specifically to secure and support RIAs. We exist to secure SEC-registered RIAs, and keep them compliant with cybersecurity regulations.

Trustack

Trustack

Trustack services cover connectivity, infrastructure services, security, unified comms, agile working and more. Our team of consultants deliver customised solutions tailored to your needs.

Queen Consulting & Technologies

Queen Consulting & Technologies

Queen Consulting & Technologies specialize in providing IT support, management, and Security to Gov’t Contractors, CPAs, and Nonprofits.

Security Solutions Services (S-3)

Security Solutions Services (S-3)

S-3 specialize in crafting tailored network design, security hardware, software, and storage solutions for businesses of all sizes.

Lupasafe

Lupasafe

Lupasafe is a software for businesses to see IT risks and insights, and provide vital training for employees.