News

2019-08-01

Four Questions To Ask After An Attack

Swift and comprehensive incident response is a critical step to ensuring the future security of a business and protecting its reputation.

2019-07-24

Easy Cyber Knowledge Ch.2: Deep Web And The Dark Web

Alfred Rolington explores the hidden parts of the internet, concealed from regular search engines, where criminality in all its forms is flourishing.

2019-07-31

5G Networks Expand In The UK

The major mobile network operators in Britain, Vodafone, O2 and Three are in a hurry to deploy the new high bandwidth, low latency technology.

2019-07-31

The Financial Services Industry Just Does Not Get It

Anthem, Equifax, First American and now CapitalOne all placed millions of confidential customer data at risk. Have they learned nothing?

2019-07-30

What Is The Dark Web?

A collection of websites that exist on an encrypted network and cannot be found by using traditional search engines or by using traditional browsers.

2019-07-30

Cyber Security Threats Are Growing In 2019

Cybercrime has hit business with increasing costs, so it is important to review your organisation's security measures against attacks in Q3 2019.

2019-07-30

GDPR Requires Better Methods Of Authentication

GDPR has brought a much tighter data protection regime and compliance should move organisations towards having much stronger user authentication.

2019-07-28

Expert Hacker Spared Jail

British hacker Marcus Hutchins is very lucky to have dodged a long jail sentence after a US judge recognised his good work in stopping Wannacry.

2019-07-29

Malware Delivery Via LinkedIn

A Phishing campaign using LinkedIn network invitations to deliver malicious documents included the use of three new malware families.

2019-07-29

One Costly Minute Of Cybercrime

Cybercriminals cost the global economy $2.9 million every minute last year, a total of $1.5 trillion according to RiskIQ's 'Evil Internet Minute'.

2019-07-29

Russia Hacked All US State Election Systems

Two years after the Presidential election, it turns out Russian hackers focused on voter registration systems and databases, not voting machines.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security is a leading manufacturer of network security appliances for use in industrial environments.

Defence Intelligence

Defence Intelligence

Defence Intelligence is an information security firm specializing in advanced malware protection.

Wipro

Wipro

Wipro Limited is a leading global information technology, consulting and business process services company.

WiJungle

WiJungle

WiJungle is an Indian Cyber Security Company that develops and markets a unified network security gateway solution.

Newtech Recycyling

Newtech Recycyling

Newtech Recycyling specializes in the removal and disposal of IT infrastructure which has reached the end of its life cycle.

MythX

MythX

MythX is the premier security analysis service for Ethereum smart contracts.

Acceptto

Acceptto

Acceptto offers the first unified and continuous authentication identity access platform with No-Password.

ToucanX

ToucanX

ToucanX has eliminated remote attack vectors without sacrificing productivity. We’ve brought embedded near real time virtualization to the enterprise endpoint.

Swiss It Security Group

Swiss It Security Group

Swiss It Security Group offers clients complete IT security concepts based on innovative solutions and technology, with a focus on protection, detection and defence.

Kalima Systems

Kalima Systems

Kalima’s mission is to securely collect, transport, store and share Industrial IoT (IIoT) trusted data in real time with devices, services and mobile workers.

BT Security

BT Security

BT provides telecommunications and network infrastructure services to keep businesses around the world connected and secure.

Sure Valley Ventures

Sure Valley Ventures

Sure Valley Ventures is an entrepreneur led venture capital fund focused on helping software entrepreneurs grow and scale businesses that will have a global impact.

Orpheus Cyber

Orpheus Cyber

Orpheus Cyber provides predictive and actionable intelligence to our clients - enabling them to anticipate, prepare for and respond to the cyber threats they face.

VC3

VC3

VC3 provides a full range of Information Technology Solutions and Services to hundreds of municipalities and organizations throughout the USA.

Eqlipse Technologies

Eqlipse Technologies

Eqlipse Technologies provides products and high-end engineering solutions to customers in the Department of Defense and Intelligence Community.

CyberMaxx

CyberMaxx

At CyberMaxx, our approach to cybersecurity provides end-to-end coverage for our customers – we use offense to fuel defense.