News

2020-05-04

Zoom 5.0 Aims To Reduce 'Zoom Bombing'

Zoom is a prime target for hackers and spies but security researchers are saying that even the new 5.0 app with encryption is a privacy threat.

2020-05-12

Effective Cyber Security Training Using The GoCyber App

One of the major issues that all organisations face is the need for real time cyber training of their people. There's an App for that.

2020-05-04

Hackers Attack Israel’s Water Infrastructure

Hackers have targeted supervisory control and data acquisition (SCADA) systems at water treatment plants and pumping stations.

2020-05-04

British Government Advice Threatens Your Cyber Security

The UK National Cyber Security Centre (NCSC) is recommending that you save your passwords in your browser. We don't recommend it.

2020-05-01

Lockdown Security Apathy Could Be A Big Risk

Organisations are struggling to get employees to buy into cyber security with a third of IT leaders saying their remote workers simply don’t care.

2020-05-01

Quantum Computing Has Far Reaching Effects On Security

Quantum computers are capable of code-breaking applications that could pose major risks to the security of current communications systems.

2020-04-30

Webinar: How to implement a software-defined network security fabric in AWS

Thursday, May 14th | Join SANS & AWS to learn how implementing an SDN can enhance visibility & control across multiple VPCs in your network.

2020-04-29

Massive Business Cost Savings With Effective Cyber Security

Cynapse calculate that UK business can save up to 40%, worth £1.3b, by shifting a proportion of their cybersecurity work to smaller innovative firms.

2020-04-29

Why Is The Skills Shortage So Big?

Companies need to keep their critical data secure, but the growing shortage of qualified cybersecurity professionals is making it difficult.

2020-04-29

Ransomware Authors Go Beyond Malicious Encryption

Ransomware is mutating into a phenomenon with two-pronged extortion at its core, adding data theft to the threat of blackmail. By David Balaban

2020-04-28

Q1 2020: Key Trends In Cyber Security

The worldwide response to Covid-19 is not the whole story for cyber security so far this year and there are some other significant emerging trends.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Homeland Security Investigations (HSI)

Homeland Security Investigations (HSI)

Homeland Security Investigations (HSI) is a premier federal law enforcement agency within the Department of Homeland Security (DHS).

Titanium Industrial Security

Titanium Industrial Security

Titanium Industrial Security specializes in advising and accompanying companies on cybersecurity in Connected Industry (Industry 4.0 / Smart Factory / IIoT).

AppTec

AppTec

AppTec is a leading software vendor in the field of Unified Endpoint Management and Mobile Security.

Valire Software

Valire Software

Valire provide a solution for the automated detection of internal fraud.

Cyfirma

Cyfirma

CYFIRMA offers Cyber threat visibility and intelligence suite and services aimed at keeping your organization’s cybersecurity posture up-to-date.

Cyber Pop-Up

Cyber Pop-Up

Cyber Pop-Up provide on-demand access to top security experts. No recruiting. No onboarding. No overhead costs.

ThriveDX

ThriveDX

ThriveDX, the world’s premier EdTech provider (formerly HackerU), champions digital transformation training as a means of empowering individuals to thrive in the age of digital disruption.

Pixm

Pixm

Pixm’s computer vision based approach offers a truly unique and effective means to protect organizations from web-based phishing attacks.

HENSOLDT Cyber

HENSOLDT Cyber

HENSOLDT Cyber introduces a paradigm shift to cyber security. Our products have been designed to ensure the integrity of embedded systems at the core: the operating system and the processor.

Easy Dynamics

Easy Dynamics

Easy Dynamics is a leading technology services provider with a core focus in Cybersecurity, Cloud Computing, and Information Sharing.

Mindaro Insurance

Mindaro Insurance

Mindaro is adding the crucial piece of the cyber security puzzle that protects your organization from the financial ramifications of cyber attacks.

CyberconIQ

CyberconIQ

CyberconIQ provide an integrated Human Defense Platform that reduces the probability and/or the cost of a cybersecurity breach by measurably improving our clients risk posture and compliance culture.

OneStep Group

OneStep Group

OneStep Group are a leading Australian provider of information and communications technology (ICT) services, connecting businesses through technology solutions and support.

IDVerse

IDVerse

IDVerse is focused on making user verification effortless through technology. We build intelligent tools that protect users from identity fraud while enabling a seamless user experience.

Cyber Advisors

Cyber Advisors

Cyber Advisors offers customizable cyber security solutions and IT services for businesses of all sizes across the nation from experts you can trust.

Cloudsmith

Cloudsmith

Cloudsmith is the only cloud-native, global, universal artifact management platform for securely developing and distributing software.