News

2019-07-29

Lancaster University Hit By Data Thieves

Lancaster University has suffered a sophisticated and malicious phishing attack which has resulted in breaches of student and applicant data.

2019-07-26

Cyberwar: Covert Cyber Attack Campaign Is Underway

A M.East cyberwar is running at full speed. Networks are being probed, weaknesses and vulnerabilities tested, offensive actions planned.

2019-07-26

Business Is Starting To Believe That AI Is The Best Defence

Two thirds of organisations acknowledge that they will not be able to respond to the next generation wave of critical threats without AI.

2019-07-25

Cannabis Buyers Are Uniquely Vulnerable To Cyber Attacks

N. America’s emerging cannabis industry, along with many of its customers, could be especially vulnerable to hackers and extortion.

2019-07-25

Cyber Criminals Are Targeting Latin America

As S.American companies and governments race to embrace the Internet, cybersecurity and the related risks of cybercrime are being ignored.

2019-07-25

Most Organisations Lack Cyber Resilience

Forget About Protection: Most organisations lack even a clear idea of what their most critical information assets are or where they're located.

2019-07-24

From Ciphers To Cyber Security

One Hundred Years Of Spying: GCHQ celebrates transparency with an exhibition of documents, devices & appliances from the agency's history.

2019-07-24

Business Leaders Are Ignoring Cyber Risks

Cyber-attacks have cost British medium sized businesses with income between £15m and £1bn at least £30bn in the past year.

2019-07-23

Privacy: Can You Trust FaceApp With Your Face?

Smartphone software used to simulate the ravages of time upon users' features is at the centre of a global cybersecurity row over its Ts&Cs.

2019-07-22

Russian FSB Hacked: "Largest data breach in its history"

Hackers have successfully targeted Russia's Federal Security Service in possibly "the largest data leak in the history of Russian intelligence."

2019-07-23

The Destabilizing Danger Of Cyberattacks On Missile Systems

Attacks that aim to disable enemy missile systems may increase the chance of them being used, not least because the systems are so vulnerable.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

44CON

44CON

44CON is an Information Security Conference & Training event taking place in London. Designed to provide something for the business and technical Information Security professional.

Covenco

Covenco

Covenco is a data management and IT infrastructure specialist. Working with customers to transform their IT environments, with data protection and security at the forefront of everything we do.

National Cybersecurity and Communications Integration Center (NCCIC)

National Cybersecurity and Communications Integration Center (NCCIC)

NCCIC is a cyber situational awareness, incident response, and management center for the US Government, intelligence community, and law enforcement.

EIT Digital

EIT Digital

EIT Digital is a leading digital innovation and entrepreneurial education organisation driving Europe’s digital transformation. Areas of focus include digital infrastructure and cyber security.

Identify Security Software

Identify Security Software

Our mission is to bring in a new age of autonomous human authentication in the security and identity space.

Unitrends

Unitrends

Unitrends helps IT pros do more with less by providing an all-in-one enterprise backup and continuity solution.

Defence Intelligence

Defence Intelligence

Defence Intelligence is an information security firm specializing in advanced malware protection.

Metrarc

Metrarc

Metrarc has developed a ground-breaking technology called ICMetrics™ for deriving secure encryption keys from the properties of digital systems without the need to store any of the encryption keys.

Plexal

Plexal

Plexal is East London's innovation centre and co-working space. We offer startups flexible memberships, giving them access to office space plus all the benefits and support they need to scale.

Techleap.nl

Techleap.nl

Techleap.nl is a non-profit publicly funded organisation helping to quantify and accelerate the tech ecosystem of the Netherlands.

HighPoint

HighPoint

HighPoint is a leading technology infrastructure solutions provider offering consultancy, solutions and managed services for network infrastructure and cybersecurity.

Iolo

Iolo

Iolo develops patented technology and award-winning software that repairs, optimizes, and protects computers, to maximize system speed and performance while keeping them safe.

CyberMaxx

CyberMaxx

At CyberMaxx, our approach to cybersecurity provides end-to-end coverage for our customers – we use offense to fuel defense.

Technation

Technation

Technation proudly represents the Canadian technology companies that are furthering our nation and the world into the future through innovation, creativity and ingenuity.

Multipoint Group

Multipoint Group

Multipoint is an information security and protection solutions company operating in the South EMEA region through value-added distribution channels.

Network Coverage

Network Coverage

Network Coverage align, maintain, and integrate technology and cloud solutions with business operations to improve productivity and security with as few issues and disruptions as possible.