News

2019-12-05

Spyware Website Taken Down

Imminent Methods: A cyber crime website selling hacking tools and spyware has been closed down after an international investigation.

2019-12-04

The Kids Cyber Protection Code

Children start facing privacy risks as soon as they enter the digital environment, long before their media literacy prepares them to make decisions.

2019-12-04

Russia’s AI Mission Is State-Driven

Russia's recognition of the strategic significance of Artificial Intelligence is taking shape and it appears to be focusing on military applications.

2019-12-04

Easy Cyber Knowledge Chapter 6: Future Cyber Predictions

The digital revolution has now become something we must personally engage with, whatever our age or experience. By Alfred Rolington

2019-12-03

Cyber Security Skills Are On The Limit

The UK's widening cyber skills gap is putting the country's businesses at risk and is proving to be a huge concern for recruitment in the field.

2019-12-03

Police Launch Global Attack On Islamic State

Belgian Police have carried out a cyber attack on a global scale against online propaganda outlets of the Islamic State extremist group.

2019-12-02

Thousands Of British Internet Domains Suspended

So far this year Nominet has suspended over 28,000 UK registered domains suspected by police of being used for criminal purposes.

2019-12-02

Using The Right Technology Saves Downtime From Cyber Attacks

Business Leaders Beware: Organisations face increasingly sophisticated cyber-attacks which are impossible to anticipate using traditional methods.

2019-12-03

US & China Are Investing Big In Quantum Computing Simulation

Quantum simulators permit the study of quantum systems that are difficult to study in the laboratory and impossible to model with a supercomputer.

2019-12-02

On Trend: Business Data Protection Laws

Eighty countries worldwide have now adopted strict data protection laws to prohibit misuse of private information. Business must react.

2019-12-02

British Elections: The Parties Manifestos On Cyber

Broadband Infrastructure. Cyber Crime. The Skills Gap. Data Security. National Defence. Taxing Big Tech. What do the main three parties have to say?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DCL Search & Select

DCL Search & Select

DCL Search & Selection connect candidates to the best companies in the IT Security, Telco, UC, Outsourcing, ERP, Audit & Control markets.

Mastercard

Mastercard

MasterCard is a leading global payments solutions company that serves consumers and businesses in over 210 countries and territories worldwide.

Nohau

Nohau

Nohau provide services for safe and secure embedded software development.

ICTSecurity Portal

ICTSecurity Portal

The ICTSecurity Portal is an interministerial initiative in cooperation with the Austrian economy and acts as a central internet portal for topics related to security in the digital world.

British Security Industry Association - CySPAG

British Security Industry Association - CySPAG

CySPAG is a special interest group within the British Security Industry Association (BSIA) focused on reducing the risk of product related cybercrime.

ProofID

ProofID

ProofID is a specialist provider of Identity Access Management (IAM) solutions. We focus on the solving the complex needs of the modern enterprise.

Secura B.V.

Secura B.V.

Secura is an independent specialized cybersecurity expert, providing insights to protect valuable assets and data.

HunCERT

HunCERT

HunCERT's mission is to assist Hungarian Internet Service Providers in applying appropriate procedures to address the risks of computer network incidents and to respond to such incidents.

Belcan

Belcan

Belcan is a global supplier of engineering, manufacturing & supply chain, workforce and government IT solutions to customers in the aerospace, defense, automotive, industrial, and private sector.

FoxTech

FoxTech

FoxTech is an independent, friendly and deeply specialised cyber security company in the UK, with expertise spanning decades of Public Sector and Government services.

Techsolidity

Techsolidity

Techsolidity is an emerging e-learning platform that offers a wide range of upskilling programs worldwide in areas including cybersecurity.

Censinet

Censinet

Censinet provides the first and only third-party risk management platform for healthcare organizations to manage the threats to patient care that exist within an expanding ecosystem.

AnzenSage

AnzenSage

AnzenSage is a cybersecurity advisory consultancy specializing in security risk resilience for the food sector: agriculture, food manufacturing, food supply chain, vineyards, and wineries.

Data Defenders

Data Defenders

Data Defenders provide information security technology solutions that empower consumers, businesses and governments with safe and secure IT and cybersecurity infrastructures.

Cyber News Live (CNL)

Cyber News Live (CNL)

Cyber News Live provide vital information and raise awareness about all things 'cyber' to ensure you stay protected in the digital world.

Anchor Technologies Inc (ATI)

Anchor Technologies Inc (ATI)

Anchor provides a full spectrum of cybersecurity services assisting our clients with all aspects of cybersecurity risk planning, identification, management, and monitoring.