News

2019-11-29

Internet of Things: Cyber Security Threats In 2020

IoT devices can work seamlessly at home, industry and in business. The problem is they also allow hackers easy ways into computer systems.

2019-11-29

Australian Parliament Hacked

It took a week to eject the state-sponsored attacker from the Australian Parliament’s IT system. They don't say the extent of the damage.

2019-11-27

Tracking 5G Protocol Flaws

Researchers have identified various security flaws in the 5G communications protocol. These include user tracking, eavesdropping and spurious billing.

2019-11-27

Cloud Storage: What Is It & Who Runs It?

Cloud computing involves outsourcing tasks you can do using your own equipment to a few large corporations. To assume it is secure is a mistake.

2019-11-29

WEBINAR: How to Leverage a CASB for Your AWS Environment

Thursday 12 December: Join SANS and AWS Marketplace to discover how to integrate modern technologies and secure your AWS footprint.

2019-11-26

GDPR Data Regulations & Commercial Fines

GDPR allows EU citizens to see what data is held on them by an organisation and how it is being used. But not all infringements lead to fines.

2019-11-26

Parliament Wants A New Cyber Security Director

Career Opportunities: To maintain awareness of internal & external threats and to be cybersecurity advocate to members of the UK Parliament.

2019-11-26

More Women Should Engage In Cyber Security Jobs

History is filled with women leaders in Science and Technology, which is why it’s puzzling that only 20% of the cyber security industry is female.

2019-11-25

Louisiana Hit With A Ransom Attack

The nations of Crimea, Georgia and Ukraine. The cities of Atlanta and Johannesberg. Now, the state government of Louisiana is knocked offline.

2019-11-25

Regulatory Plans For Artificial Intelligence & Algorithms

Two pieces of legislation are under consideration by the US Congress, one regulating the use of Algorithms and the other the development of AI.

2019-11-25

N Korean Hackers Are Targeting India

N Korean hackers identified with with wide-ranging financial theft are now being linked to attacks on India's nuclear power and space programs.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Quotium

Quotium

Quotium provides automated testing technologies to make business software applications secure and robust.

Compass Security

Compass Security

Compass Security is a specialist IT Security consultancy firm based in Switzerland. Services include pentesting, security assessments, digital forensics and security training.

RiskCentric

RiskCentric

RiskCentric is a consultancy specializing in risk management and compliance.

Digital Innovation Hub Slovenia (DIH)

Digital Innovation Hub Slovenia (DIH)

DIH Slovenia is a central hub providing services to grow digital competencies in areas including robotics, IoT, cyberphysical systems and cybersecurity.

Capy

Capy

Capy's SaaS-based security solutions will protect your website from bots, spam, humans and more.

Trusted Objects

Trusted Objects

Trusted Object's mission is to provide state of the art security solutions and services enabling a strong root of trust for the IoT ecosystem.

Cyber Tec Security

Cyber Tec Security

Cyber Tec Security is an IASME Certification Body for Cyber Essentials basic/Plus. We also provide ongoing Managed Security Services.

Axiomtek

Axiomtek

Axiomtek is a leading design and manufacturing company in the industrial computer and embedded field.

Privafy

Privafy

Privafy helps mobile service providers, IoT manufactures , and enterprises redefine the way they protect Data-in-Motion.

European Center for CyberSecurity in Aviation (ECCSA)

European Center for CyberSecurity in Aviation (ECCSA)

ECCSA is a cooperative partnership within the aviation community to better understand emerging cybersecurity risks in aviation and provide collective support in dealing with cybersecurity incidents.

Twingate

Twingate

Twingate help organizations secure and manage access to their technology resources in a world where people work from anywhere.

Onyxia Cyber

Onyxia Cyber

Onyxia's unique dynamic cybersecurity platform identifies gaps and prioritizes recommendations for proactive cybersecurity strategy, performance, remediation and management.

Skyhawk Security

Skyhawk Security

Skyhawk Security is the originator of Cloud threat Detection and Response (CDR), helping hundreds of users map and remediate sophisticated threats to cloud infrastructure in minutes.

Cyber Proud

Cyber Proud

Cyber proud is leading a talent revolution to promote and create an inclusive skilled cyber workforce.

Rootly

Rootly

Rootly is an incident management platform on Slack that helps automate manual admin work during incidents.

GO Business

GO Business

GO Business are a specialised B2B team within GO that caters to the communication needs of the local business community in Malta.

Hummingbird International

Hummingbird International

Hummingbird International, LLC offers services for the collection, audit, computer recycling and safe disposal of laptops, monitor/LCD, hard drives, and IT disposal.