News

2019-11-12

Ransomware, Phishing And Botnets

Webroot has released its annual 'Nastiest Malware' list, shedding light on a number 2019’s worst cyber security threats.

2019-11-13

Artificial Intelligence & The Ethics Of War

Responsible, Equitable, Traceable, Reliable, Governable: The Pentagon has produced its first Ethical Code to govern the military use of AI.

2019-11-11

WEF Report Confirms Cyber Attack Risk Is Growing Worldwide

Form-jacking, crypto-jacking, ransomware and other cyber-attacks represent the greatest risks in six out of ten of the top economies in the world.

2019-11-11

Cyber Insurance Might Actually Encourage Attacks

Has cyber insurance responded to increased threat levels by expanding coverage to adapt to the full consequences that companies can suffer?

2019-11-11

Tech Giants Have Facilitated An Online Slavery Market

An undercover BBC Arabic investigation has found that domestic workers are being illegally bought and sold online in a booming black market.

2019-11-11

Cyber Crime Is An Increasing Risk For Charities

Cyber crime is a greater risk to the charity sector than other sectors and smaller organisations are particularly vulnerable.

2019-11-08

Fake News Generated Against Hong Kong Protesters

Discovered: A coordinated network of activities by China that spread disinformation on social media about the mass protests in Hong Kong.

2019-11-08

Cyber Attack On A Nuclear Power Plant

Despite an initial denial, India's largest Nuclear Power Plant has now confirmed it suffered a malware attack.

2019-11-08

Machines With The Power To Kill

People have quit Google protesting the company's co-operation with the Pentagon on autonomous weapons, which they claim are dangerous.

2019-11-08

On Demand Webinar: How to secure app pipelines in AWS

SANS and AWS Marketplace discuss how to improve and automate security across the CI/CD pipeline and runtime environment. - On Demand -

2019-11-06

Hacking Skills Can Qualify You For A Top Cybersecurity Job

Ethical Hacking: Many security professionals believe hacking is the most important skill and its a great way to break into the cybersecurity industry.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NSFOCUS Information Technology

NSFOCUS Information Technology

NSFOCUS is a global service provider and enterprise DDoS mitigation solution provider.

LogmeOnce

LogmeOnce

LogmeOnce provides users with solution to multiple Password problems, Single Sign-On (SSO), and Identity Management.

Cyber Together

Cyber Together

Cyber Together is dedicated to advancing the cyber security industry by giving businesses access to Israel’s leaders, innovators and great minds in the field of cyber security.

CyberDef

CyberDef

CyberDef is a consulting company specialising in cyber defence services for small and medium enterprises.

KLC Consulting

KLC Consulting

KLC Consulting offers information assurance / Security, IT Audit, and Information Technology products and services to government and Fortune 1000 companies.

Callsign

Callsign

Callsign’s mission is to seamlessly power the identification of every web, mobile and physical interaction.

IPQualityScore (IPQS)

IPQualityScore (IPQS)

IPQS anti-fraud tools provide a real-time fraud score to analyze how likely a user or visitor is to engage in fraudulent behavior.

BrandProtections.Online

BrandProtections.Online

BrandProtections.online offer end-to-end customer support solutions to help protect against threats which may affect your brand online.

Dataprovider.com

Dataprovider.com

Our Brand Protection Suite gives you the tools to discover trademark infringement on the Internet, such as websites selling counterfeit products, even when this is not immediately noticeable.

Drip7

Drip7

Drip7 is a micro-learning platform that is re-inventing the way companies train their employees and build lasting cultural change around the importance of cybersecurity.

DeVry University - Cyber Security Degree

DeVry University - Cyber Security Degree

Explore the dynamic world of data protection with a hybrid or online cyber security degree specialization with DeVry's IT & Networking Bachelor's Degree.

Alibaba Cloud

Alibaba Cloud

Alibaba Cloud is committed to safeguarding the cloud security for every business by leveraging a comprehensive suite of enterprise security services and products on the platform.

UNS Inc.

UNS Inc.

UNS is a top services partner for multiple leaders in the global cybersecurity industry – we do business in 40 countries, including the United States, Canada, Chile, and Colombia.

Xoriant

Xoriant

Xoriant is a technology leader and execution partner throughout the Build, Run and Transform lifecycle for companies that create and use technology products.

Ceeyu

Ceeyu

Ceeyu is an all-in-one cybersecurity ratings and third party risk management platform.

ThreatER

ThreatER

ThreateER (formerly ThreatBlockr / Bandura Cyber) is a cybersecurity platform that provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale.