News

2020-03-28

New Guidelines For Maritime Cyber Security

Cyber attacks on maritime freight may result in severe operational failures and new guidelines aim to contain threats from phishing emails & malware.

2020-03-27

Rapid Deployment Of 5G Is A Headache

The transition to 5G increases both the speed and volume of data communication, but there are a number of important issues which are problematic.

2020-03-26

AI Can Give An Early Warning Of Coronavirus

When applied to unstructured data, Artificial Intelligence is better at simulating disease spread than algorithms that rely on public health data.

2020-03-25

How Does The CCPA Compare To The GDPR?

Both the GDPR and the CCPA emphasize the need for companies to implement user privacy protection, but there are important differences.

2020-03-25

Take Action On Cyber Security Training

Organisations need to create a sophisticated risk-aware culture to stay secure and cyber security training is a very important part of that process.

2020-03-24

Fronton: A Secret Russian Tool To Shut Down The Internet

Russia's national spy agency has powerful new tools that can shut down internet services by tapping into IoT connected smart devices.

2020-03-23

How Effective Is Your Threat Intelligence?

Treat intelligence helps organisations make informed decisions on how to prepare for, identify and prevent threats to their cyber security.

2020-03-23

Covid-19 Virus Impacts Home Working

The C-19 virus is being increasingly used as a subject to engage readers with phishing emails and deliver a range of other attack vectors.

2020-03-23

Remote Working Is On Suddenly On Trend

The adoption of secure technology to enable the flexibility of working from multi-locations and online collaboration is suddenly urgent.

2020-03-20

Warning: Coronavirus Scams Surging

Right now, there are growing serious concerns about the threats posed by the current Coronavirus situation and the risk of online fraud.

2020-03-20

Redefining OSINT To Win The Cybercrime War

As the quantity & complexity of data increases and criminals become more creative, the investigations industry must urgently respond. By Julie Clegg

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Integrity360

Integrity360

Integrity360 provide fully managed IT security services as well as security testing, integration, GRC and incident handling services.

Referentia

Referentia

Referentia leads the development of critical infrastructure solutions that benefit society, including cyber security and network performance management.

Decision Group

Decision Group

Decision Group are a Total Solution Supplier offering Network Forensics and Lawful Interception tools.

Nouveau

Nouveau

Nouveau Solutions is a specialist IT managed services company with a strategic focus on delivering cloud, infrastructure, compliance, network and security solutions.

Asoftnet

Asoftnet

Asoftnet are specialists in IT security, IT forensics, IT service, websites, applications and mobile solutions.

EVOLEO Technologies

EVOLEO Technologies

EVOLEO provides engineering services covering a wide range of needs in the electronics design, embedded and systems engineering.

CyberSec Hub - The Kosciuszko Institute

CyberSec Hub - The Kosciuszko Institute

The goal of CyberSec Hub is to create a centre of excellence for cybersecurity in Krakow, a new European “Cyber-Silicon Valley”.

ControlMap

ControlMap

ControlMap is a software as a service platform with a mission to simplify and eliminate stress from everyday operations of modern IT compliance teams.

Securolytics

Securolytics

Securolytics offers the simplest, most complete and affordable IoT security for all organizations. Securolytics quickly identifies unmanaged devices to reduce security and compliance risks.

Intel

Intel

Intel products are engineered with built-in security technologies to help protect potential attack surfaces.

Spyderbat

Spyderbat

Spyderbat ATI closes the manual investigation gap between detection and response by instantly presenting causally connected threat activity to security analysts at the onset of an investigation.

ClosingLock

ClosingLock

ClosingLock is the leading provider of wire fraud prevention software for the real estate industry.

Quartz Network

Quartz Network

Quartz Network is a curated community for change-makers, up-and-comers, and professionals who are ready to grow, adapt, and thrive.

iVision

iVision

iVision is a technology integration and management firm that engineers success for clients through objective recommendations, process and technology expertise and best-of-breed guidance.

Normalyze

Normalyze

Normalyze are solving some of the most painful problems enterprise IT security teams face in the cloud and data security space. We help enterprises protect all the data they run in the cloud.

Ofcom

Ofcom

Ofcom is the UK's communications regulator. We regulate the TV, radio and video on demand sectors, fixed line telecoms, mobiles, postal services, plus the airwaves over which wireless devices operate.