News

2020-07-10

Cyber Security Essentials For StartUps

While it may not seem the most urgent priority for entrepreneurs, increasing the emphasis on cyber security will reward a growing business.

2020-07-10

Fake News Promotes Extremism

The US Department of Homeland Security says social media fills the void for socially isolated individuals and amplifies violent extremism.

2020-07-09

Maritime Data For Sale On the Dark Web

Two separate ransomware attacks on a major shipping firm highlight the need for improved cyber security training in the maritime industry.

2020-07-06

Journalist’s Phone Hacked Using An ‘Invisible’ Technique

The iPhone was infected by “network injection,” a fully automated technique which intercepts a cellular signal when it visits a website.

2020-07-06

Iran’s Nuclear Site Attacked Following Attempts To Hack Israel's Water System

A cyber attack is thought to have caused a fire at Iran's Natanz nuclear enrichment facility, after a failed attempt to poison Israel's water supply.

2020-07-06

Hackers Extort $1.14m From University of California

The University of California has paid a ransom of $1.14 million to hackers to restore encrypted data following an attack on its School of Medicine.

2020-07-03

Hong Kongers Erase Their Digital Footprints

Hong Kong residents hurry to alter their digital footprints or remove their presence entirely from social media to escape new Chinese security law.

2020-07-03

Police First Hack Then Demolish Organised Crime Gangs

Police arrest 800 people across Europe after shutting down the encrypted EncroChat platform, used by organised crime groups for drug deals.

2020-07-02

Artificial Intelligence – A Brief History

AI is technology that enables a computer to think or act in a more 'human' way. It has a long history and has recently made incredible advances.

2020-07-01

LinkedIn ‘Job Offers’ Targeted Aerospace & Military Personnel

A malware campaign used LinkedIn spear-phishing messages posing as recruiters to steal data from the military and aerospace executives.

2020-07-02

Webinar: How To Protect All AWS Services & Surfaces

July 16th, 2020 | Explore best practices and get practical guidance on implementing a multi-layer defense strategy for security in the cloud.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Indelible Data

Indelible Data

Indelible Data is an established information security and technology consultancy and a Cyber Essentials Certification Body.

Software Testing News

Software Testing News

Software Testing News provides the latest news in the industry; from the most up-to-date reports in web security to the latest testing tool that can help you perform better.

Cyber Indemnity Solutions (CIS)

Cyber Indemnity Solutions (CIS)

CIS is an InsurTech company focused on licensing innovative cyber risk insurance solutions to the global insurance industry.

Sigma Payment Solutions

Sigma Payment Solutions

Sigma Payment Solutions offers a comprehensive suite of automated payment processing services, solutions, and technology to businesses in the USA.

Abusix

Abusix

Abusix specializes in Internet security, network abuse handling, antispam and fraud prevention.

CyberGRX

CyberGRX

The CyberGRX Exchange and our risk assessments-as-a-service help Enterprises and Third Parties cost-effectively identify, prioritize and mitigate risk.

SMESEC

SMESEC

SMESEC is a lightweight Cybersecurity framework for protecting small and medium-sized enterprises (SME) against Cyber threats.

Morphus Information Security

Morphus Information Security

Morphus is an information security company providing Red Team, Blue Team and GRC services as well as conducting research in cybersecurity and threat analysis.

Eclypsium

Eclypsium

Eclypsium protects organizations from the foundation of their computing infrastructure upward, controlling the risk and stopping threats inside firmware of laptops, servers, and networks.

World Congress on Industrial Control Systems Security (WCICSS)

World Congress on Industrial Control Systems Security (WCICSS)

The World Congress on Industrial Control Systems Security (WCICSS) is focused on emerging trends in protection of industrial control systems.

ISA Global Cybersecurity Alliance (ISAGCA)

ISA Global Cybersecurity Alliance (ISAGCA)

Objectives of the ISA Global Cybersecurity Alliance include the acceleration and expansion of standards, certification, education programs, advocacy efforts, and thought leadership.

Spotit

Spotit

Spotit offers a wide-ranging portfolio of technologies and services, from consultancy, assessments and pentesting to the set up of completely new security and network infrastructures.

IGI Cybersecurity

IGI Cybersecurity

IGI Cybersecurity delivers people-driven cybersecurity for personalized, resilient cyber defense focused on individualized strategy and unshakeable partnership.

ANSSI Burkina Faso

ANSSI Burkina Faso

ANSSI is responsible for managing the security of information systems and cyberspace in Burkina Faso.

Orca Fraud

Orca Fraud

Orca is an AI-driven fraud orchestration platform. We empower fraud fighters to outpace fraud using our custom ML models.

Axiotrop

Axiotrop

AXIOTROP is a Cybersecurity firm offering leading services in assessment, remediation, and validation to protect the confidentiality, integrity, and availability of regulated information.