News

2019-05-10

Israel Responds To A Cyber Attack With Bombs

Israeli Defence Forces have said that they launched air-strikes on a building which is believed to have housed Hamas digital warfare operatives.

2019-05-09

Snowden Explains Why The CIA Is On Instagram

Edward Snowden has cast light on the reasons why the secretive US spy agency is emerging from the shadows and embracing social media.

2019-05-08

A Microphchip That Can Stop Cyber Attacks

The chip, called Morpheus, blocks potential attacks by encrypting and randomly reshuffling key bits of its own code and data 20 times per second.

2019-05-08

Using Identity Access Management

Identity Access Management is a key element of modern cybersecurity strategy, So why then, aren’t more companies using it?

2019-05-08

Mossad Needs Cyber Experts

Israel's national intelligence agency, known as Mossad, is looking for more highly- trained experts for its operational arm.

2019-05-08

Engaging With Cybersecurity

Cyber attacks are an existential threat to business and companies face a challenge in getting employees on board with good security practice.

2019-05-08

AI And The Future Of Warfare

The Pentagon's strategic thinkers would like AI to help human analysis, not replace it. But how will humans interact with AI and robots?

2019-05-07

How Algorithms Are Being Used

From screening job applicants to analysing demographic data, optimised algorithms are playing an increasing part in human interactions.

2019-05-07

Cybercrime Cost US Business $2.7B In 2018

The FBI's report on cybercrime shows the most costly issues involved business email breaches, confidence fraud & investment scams.

2019-05-07

Five Eyes Intelligence Chiefs Point The Finger

International Intelligence Chiefs agree that attributing blame for attacks by nation-state hackers can improve security awareness.

2019-05-07

AI Will Shape The Future 6G Network

6G will be an enormous step up from 5G and AI will become the enabling force behind a whole new generation of machine intelligence applications.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Hex Security

Hex Security

Hex Security Limited is a specialist Information Assurance (IA) consultancy working with associates and partners to deliver security certification and accreditation support.

Phoenix TS

Phoenix TS

Phoenix TS offers world-class management, computer, and IT security certification training courses.

AppRiver

AppRiver

AppRiver is a global provider of cloud-based email and web security solutions that protect businesses worldwide from today's ever-changing online threats.

Viscount Systems

Viscount Systems

Viscount Systems is a global security software solutions company that is changing the way access control is deployed and managed in the enterprise.

Zeguro

Zeguro

Zeguro provides complete cybersecurity risk assessment, mitigation and insurance, allowing you to easily manage your cyber risk.

Whistic

Whistic

Whistic is a cloud-based platform that uses a unique approach to address the challenges of third-party risk management.

Bloc Ventures

Bloc Ventures

Bloc Ventures is an investment company providing long-term, ‘patient’ equity capital to early stage unquoted deep technology companies.

Center for Medical Device Cybersecurity (CMDC) - University of Minnesota

Center for Medical Device Cybersecurity (CMDC) - University of Minnesota

CMDC’s mission is to foster university-industry-government partnerships to assure that medical devices are safe and secure from cybersecurity threats.

Citadel Cyber Security

Citadel Cyber Security

Citadel is a leading 'One Stop Shop' provider of consulting services in cyber and information security. Our experts operate in hundreds of business organizations in Israel and around the world.

RankedRight

RankedRight

RankedRight empowers security teams to take immediate action on their most critical risks.

Tuta

Tuta

Tuta (formerly Tutanota) is an all-in-one email, calendar and contacts app which protects your data with full end-to-end encryption and it requires zero personal information.

Harbor Networks

Harbor Networks

Harbor Networks is a communications systems integrator and managed services provider. We provide business consultation services for voice and data communication technology.

Mayer Brown

Mayer Brown

Mayer Brown is a global law firm. We have deep experience in high-stakes litigation and complex transactions across industry sectors including the global financial services industry.

IS4IT Kritis

IS4IT Kritis

IS4IT is your partner for the successful planning, introduction and implementation of company-specific information security concepts.

Netia

Netia

Netia is a Polish telecommunications company providing a range of business services including network solutions, communications, data centre and cloud, and cybersecurity.

Boldend

Boldend

Boldend offers leading-edge offensive and defensive cybersecurity solutions that empower government and commercial organizations to stay resilient in an evolving threat landscape.