News

2019-01-11

Cybercrime Gangs Continue To Innovate

Phishers are using new techniques to carry out their attacks, and obscure their origins, to make the most of every criminal campaign.

2019-01-10

Fortnite Teen Hackers 'Earning Thousands of Pounds a Week'

Children as young as 14 are making thousands of pounds a week as part of a global hacking network built around the popular video game Fortnite.

2019-01-09

Quantum Computing – Advantage Or Security Threat?

Some US government agencies see quantum computing and artificial intelligence as potential near-term security threats.

2019-01-10

How To Develop Good Cybersecurity Practice

Doing Better Business: The potential revenue from rising compliance requirements and security threats is hard to ignore.

2019-01-05

Major US Newspapers Under Malware Attack

Several major newspaper titles suffered serious print and delivery disruption caused by targeted cyber-attacks originating outside the US.

2019-01-08

German Politicians Suffer Mass Hacking

Personal data, phone numbers & financial information of politicians, including Angela Merkel and President Steinmeier, are leaked via Twitter.

2019-01-08

Hackers Demand Ransom For Stolen 911 Documents

Secret information about the murderous 911 attacks has allegedly been stolen from the insurer and is being offered for sale to terrorist groups.

2019-01-08

Revealed: Top Secret Israeli Hackers For Hire

Candiru is an offensive cyber company comprising ex-military specialists that can sell its customers a complete attack system.

2019-01-07

Optimising Maritime Cybersecurity

Modern vessels have multiple, complex technologies. Now, both onboard and shoreside crews can monitor each ship and an entire fleet

2019-01-07

Cyber Attacks On Business Are Surging

2018 saw a massive increase in global cybercrime with the damage done taking a measurable proportion of GDP, running into billions of dollars

2019-01-07

Prosecutors Sue Facebook Over Cambridge Analytica

Facebook faces a fine of up to $1.7 billion if all 340,000 instances are considered “violations” as Washington prosecutors press charges.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

iXsystems

iXsystems

iXsystems is a leader in Open-Source enterprise server and storage solutions including Backup & Recovery to protect critical data.

Corero Network Security

Corero Network Security

Corero Network Security is dedicated to improving the security of the Internet through the deployment of its innovative DDoS & Network Security Solutions.

Progress Flowmon

Progress Flowmon

Progress Flowmon (formerly Flowmon Networks) provide high performance network monitoring technology and behavior analytics to enhance network performance and deal with cyber threats.

Japan Information Security Audit Association (JASA)

Japan Information Security Audit Association (JASA)

JASA is non-profit association active in developing and managing the quality of Information Security Auditing and Auditors in Japan.

Silverskin Information Security

Silverskin Information Security

Silverskin is a cyber attack company that specializes in having knowledge of the attacker's mindset to identify vulnerabilities and build effective and persistent defences.

NSIT

NSIT

NSIT SAS is a consulting, advisory and service provider in IT systems. Solution areas include networking & infrastructure, IT management & administration, and cyber security.

Learn How To Become

Learn How To Become

At LearnHowToBecome.org, our mission is to help any job-seeker understand what it takes to build and develop a career. We cover many specialist areas including cybersecurity.

Nihon Cyber Defense

Nihon Cyber Defense

Nihon Cyber Defence’s mission is to provide robust solutions, services and support to governments, corporates and organisations in order to protect them from all forms of cyber warfare.

TM One

TM One

TM One is the enterprise and public sector business solutions arm of Telekom Malaysia Berhad (TM) Group.

Perch Security

Perch Security

Perch is a co-managed threat detection and response platform backed by an in-house Security Operations Center (SOC).

Winbond Electronics

Winbond Electronics

Winbond is a Specialty memory IC company. Product lines include Code Storage Flash Memory, TrustME® Secure Flash, Specialty DRAM and Mobile DRAM.

National Cryptologic Foundation (NCF)

National Cryptologic Foundation (NCF)

The National Cryptologic Foundation strives to influence the cryptologic future by sharing our educational resources, stimulating new knowledge, and commemorating our heritage.

Ostra Cybersecurity

Ostra Cybersecurity

As a next-generation MSSP, Ostra Cybersecurity combines best-in-class tools, proprietary technology and exceptional talent to deliver Fortune 100-level protection for businesses of all sizes.

ID R&D

ID R&D

ID R&D is an award-winning provider of AI-based facial liveness, document liveness, and voice biometrics.

Acclaim Technical Services (ATS)

Acclaim Technical Services (ATS)

ATS provide operational products, services and solutions to the defense and intelligence communities for all types of critical mission needs.

Cynch Security

Cynch Security

Cynch Security are passionate about building a world where every business is resilient to cybersecurity risks, no matter what their size.