News

2021-03-02

Five Steps For Managing EdTech Security Risks

EdTech companies have a special responsibilty to protect their users, who are mostly adolescents & children, from online threats. By Angela Baker

2021-03-01

Three Reasons The Security Industry Is Protecting The Wrong Thing

For too long organisations have been focusing on protecting their network, when they should have been protecting their data. By Paul German

2021-03-02

Russian Hackers Make A Sustained Attack On France

Leading French companies, government agencies and City authorities have fallen victim to a 'supply chain' attack similar in execution to SolarWinds.

2021-03-01

Microsoft Releases Free Tool For Hunting SolarWinds Malware

Microsoft is open-sourcing the CodeQL queries tool it used to investigate the impact of malware planted in the SolarWinds Orion software updates.

2021-02-26

New Solutions For Zero-Day Attacks

Emergency Patches: Defending against zero-day attacks is one of the most fundamentally challenging security problems yet to be solved.

2021-02-26

Social Media’s Troublesome Influence On Politics

Social media platform architectures are not primarily designed for democratic discourse, yet they are heavily used for political purposes.

2021-02-25

Australia Makes Google & Facebook Pay

Following an ugly confrontation, Google and Facebook are now required to negotiate with news outlets to pay for their content, or face arbitration.

2021-02-25

GCHQ Jammed ISIS Drones & Servers

A secret cyber operation which involved disabling drones, jamming mobile phones and targeting computer servers to block online propaganda.

2021-02-24

Cyber Security Is Crucial For Maritime Shipping

Cyber attacks targeting ocean transport are growing exponentially and present great risks to the safety of crews, vessels, cargoes and ports.

2021-02-23

Cyber Security Training Goes Gaming

A scenario-based, gamified learning tool that drives high levels of engagement through popular elements used widely in the video gaming world.

2021-02-23

Tracking Modern Slavery On The Dark Web

Human trafficking is law enforcement's biggest challenge.This vile trade goes on hidden from sight on the Dark Web and includes children.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

DKCERT

DKCERT

DKCERT (Danish Computer Security Incident Response Team) is a service of DeIC (Danish e-Infrastructure Cooperation).

VdS

VdS

VdS is an independent safety and security testing institution. Cybersecurity services include standards, audit/assessment and certification for SMEs.

Second Nature Security (2NS)

Second Nature Security (2NS)

2NS provide vulnerability assessment, penetration testing, security audit, application and network security and secure software development processes.

BooleBox

BooleBox

Boolebox is the innovative suite of enterprise data protection applications that preserve the integrity and confidentiality of data from any unauthorized access.

Kuratorium Sicheres Österreich (KSO)

Kuratorium Sicheres Österreich (KSO)

KSO is an independent non-profit association that has set itself the goal of making Austria safer as a national networking and information platform for topics of internal security.

CSIRT-NQN

CSIRT-NQN

CSIRT-NQN is the Computer Incident Response Team for the Argentine province of Neuquen.

ICS Cyber Security Conference

ICS Cyber Security Conference

SecurityWeek’s Industrial Control Systems (ICS) Cyber Security Conference is the largest and longest-running event series focused on industrial cybersecurity.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Tyler Technologies

Tyler Technologies

Tyler Technologies is a leading provider of end-to-end information management solutions and services for local governments.

Unlimited Technology

Unlimited Technology

Unlimited Technology offers a wide range of talent and experience, from assessing your requirements to implementing technologically advanced security solutions to best fit your needs.

National Cyber Coordination & Command Centre (NC4) - Malaysia

National Cyber Coordination & Command Centre (NC4) - Malaysia

NC4 is established as a center for dealing with cyber threats and crisis at the national level in Malaysia.

MorganFranklin Consulting

MorganFranklin Consulting

MorganFranklin Consulting is a management advisory firm that works with businesses and government to address complex and transformational technology and business objectives including cybersecurity.

Cyber Security Authority (CSA) - Ghana

Cyber Security Authority (CSA) - Ghana

The Cyber Security Authority has been established to regulate cybersecurity activities in Ghana.

IntelliDyne

IntelliDyne

IntelliDyne is a leading information technology consulting firm enabling better mission performance through innovative technology solutions.

Everfox

Everfox

Everfox (formerly Forcepoint Federal) has been defending the world's most critical data and networks against the most complex cyber threats imaginable for more than 25 years.

Pontiro

Pontiro

At Pontiro, we are enabling a new era of data-sharing. Bridging the gap between protected data and valuable insights through the use of cutting edge Homomorphic Encryption.