News

2020-08-18

Seven Cyber Security Questions Businesses Need To Ask Themselves

The British National Cyber Security Centre is offering technical advice on cyber insurance for businesses in the form of seven questions.

2020-08-18

Chinese Hackers Aim To Plunder Taiwan's Semiconductor Industry

Advanced semiconductor chips are vital for the IoT and 5G telecoms. Making them is Taiwan's strategic industry and China wants their secrets.

2020-08-18

Teacher Estimates Replace Algorithm That Reduced Exam Grades

It turned out to be a drastic mistake to allow high school students' critical examination results to be graded by Artificial Intelligence.

2020-08-17

NSA And FBI Warn Of Russian Linux Malware

Drovorub malware is a full-featured piece of Linux malware to infiltrate networks, steal confidential information and execute malicious commands.

2020-08-19

The Rise of the Business-Aligned Security Executive

Is your security operation aligned with the goals of the business? Learn how CISOs can reduce cyber risk while powering innovation. Download the Study.

2020-08-17

The Digital Revolution Is Evolving

New technologies, growing amounts of data and smarter ways of getting insights are changing the way people, businesses & governments interact.

2020-08-14

Belarus Government Shut Off The Internet During Elections

Election Day: Belarusians experienced Internet blackouts and major social networks, instant messengers & search engines were inaccessible.

2020-08-14

Cybercrime In Britain Does Serious Harm

Cyber crime covers a wide range of different offences, all of which are punishable by law in the UK. Be vigilant and avoid becoming a victim.

2020-08-17

WEBINAR: How to achieve security visibility at scale in the AWS Cloud

Explore how security teams can leverage solutions to create visibility at scale allowing you to do more with your data & improve your security posture.

2020-08-14

Google Bans Ads Linking To Hacked Political Content

Google will block advertising that contains hacked political content in an effort to prevent major interference in the 2020 US Presidential election.

2020-08-14

Essential Books For Learning About Cyber Security

Reading List: Get clued up to make sure you have the technical skills to find the areas of vulnerability and avoid cyber security disasters.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Red Hat

Red Hat

Red Hat is a leader in open source software development. Our software security team proactively identifies weaknesses before they become problems.

Integrity360

Integrity360

Integrity360 provide fully managed IT security services as well as security testing, integration, GRC and incident handling services.

CyberSmart

CyberSmart

CyberSmart is a platform that allows you to maintain compliance, achieve certification and secure your organisation.

Cipher Security

Cipher Security

Cipher Security provides unique robustness tests and penetration tests, as well as customizable development services for vendors and providers.

Riverside Research

Riverside Research

Riverside Research is a not-for-profit organization chartered to advance scientific research in areas including Trusted & Resilient Systems.

Cryptovision

Cryptovision

Cryptovision GmbH is one of the leading specialists for modern, user-friendly cryptography and solutions for secure electronic identities.

Excelerate Systems

Excelerate Systems

Excelerate Systems is a leading provider of IT services with a focus on Big Data, Cloud Services and Security.

Combined Selection Group (CSG)

Combined Selection Group (CSG)

CSG are Global Talent Experts, we operate across 7 specialist sectors, including Information Technology and Cybersecurity, and take a pro-active approach to executive search and headhunting.

Tapestry Technologies

Tapestry Technologies

Tapestry Technologies supports the Department of Defense in shaping its approach to cybersecurity.

Hunter Strategy

Hunter Strategy

Hunter Strategy focuses on delivering solutions that are concise, scalable, and target our customer’s complex technical challenges.

ARIA Cybersecurity Solutions

ARIA Cybersecurity Solutions

The ARIA ADR Automatic Detection & Response solution was designed to find, verify, and stop all types of attacks - automatically and in real time.

WhiteJar

WhiteJar

WhiteJar offers an innovative approach to modern cybersecurity needs, empowering Ethical Hackers within its unique crowd platform.

Celebrus

Celebrus

Celebrus Fraud Data Platform, by D4t4 Solutions, works with existing fraud structures to augment functionality and turn fraud management into true fraud prevention.

PagerDuty

PagerDuty

PagerDuty is the central nervous system for a company’s digital operations. We identify issues in real-time and bring together the right people to respond to problems faster.

VISO Cyber Security

VISO Cyber Security

VISO provide Cyber Security Consulting and CISO as a Service to companies who need to augment their leadership teams with information security expertise.

Anonos

Anonos

Anonos is a global software company that provides the only technology capable of protecting data in use with 100% accuracy, even in untrusted environments.

Access Venture Partners

Access Venture Partners

Access Venture Partners are an early stage VC firm investing in bold founders and helping every step of the way. Areas we give special focus to include cybersecurity.

Gomboc.ai

Gomboc.ai

Gomboc solve cloud infrastructure security policy deviations by providing tailored remediations to the IaC (Infrastructure as Code).