News

2018-09-21

Millions Of WiFi Routers Are At Risk Of Hacking

Millions of WiFi networks are vulnerable due to weaknesses in how saved passwords in web browsers interact over unencrypted connections.

2018-09-20

UK Fallout From The Massive Breach At Equifax

The ICO has issued Equifax’ UK subsidiary with the maximum fine of £500,000 for failing to protect personal information of 15m UK citizens.

2018-09-20

The Human Factor Is Essential To Eliminating Bias in Artificial Intelligence

It is not enough to open the ‘black box’ of machine learning. Direct human evaluation is the only way to ensure biases are not perpetuated through AI.

2018-09-20

Keeping Young People Off The Dark Web

UK police are looking for cybersecurity firms to help implement a strategy of steering youngsters away from a life in online crime.

2018-09-19

Iran Targets Kurds With Spyware

Malware collects the target's mobile data including contact lists, phone call records, SMS messages, geo-location, photos, voice messages and more.

2018-09-19

A Breakthrough In Video Analytics

New AI-based video analytics technology powers a 20x improvement in central monitoring and video review through cutting-edge collection & analysis.

2018-09-19

Snowden Demands A Penalty For Misuse Of Aadhaar Data

The Indian government Aadhaar program offers a unique personal ID that can be obtained by residents, using their biometric & demographic data.

2018-09-18

The BA Hack And How Not To Respond To A Cyber Attack

There have been poor responses to cyber attacks on major companies before, but the airline’s actions could be one of weakest in recent history.

2018-09-20

Edward Snowden Reconsidered

Five years since Edward Snowden’s revelations of mass surveillance and his subsequent flight to Moscow, here is a lengthy reflection on his actions.

2018-09-18

What Every Small Business Should Know About Hackers & Cybersecurity

It’s a case of when, not if, a cyber attack will take place and preparation is the key. You cannot simply leave it to the IT department to deal with.

2018-09-18

Students Blamed For University & College Cyber Attacks

Analysis of cyberattacks on UK universities' research and academic networks concludes there must be "suspicions" over staff and students.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ThaiCERT

ThaiCERT

ThaiCERT is the national Computer Security Incident Response Team (CSIRT) for Thailand.

ShmooCon

ShmooCon

ShmooCon is an annual east coast hacker convention offering three days of demonstrations and discussions of critical infosec issues.

Integrity360

Integrity360

Integrity360 provide fully managed IT security services as well as security testing, integration, GRC and incident handling services.

TSUNAMI

TSUNAMI

The TSUNAMi center focuses on software and system security and how trustworthy software can be built from COTS software components.

Inspired eLearning

Inspired eLearning

Inspired eLearning deliver solutions that help clients nurture and enhance workforce skills, protect themselves against cyberattacks and regulatory violations.

DocAuthority

DocAuthority

DocAuthority automatically discovers and accurately identifies unprotected, sensitive documents, enabling a broad yet business-friendly security policy.

Custodio Technologies

Custodio Technologies

Custodio Technologies was established as a Singaporean R&D Centre of Israel Aerospace Industries (IAI) in order to spearhead R&D activities in the field of cyber early warning.

Private Internet Access

Private Internet Access

Private Internet Access is a Virtual Private Network services provider offering secure encrypted access to the internet.

OutThink

OutThink

OutThink is a web-based platform (SaaS) that has been developed specifically to identify and reduce risky workforce behaviours and build a risk aware culture.

ADL Process

ADL Process

ADL Process offer secure data destruction, certified product destruction and responsible electronics recycling services to businesses and institutions.

Labs/02

Labs/02

Labs/02 is a seed-stage incubator with a mission to advance cutting-edge technology in innovative areas including AI, deep learning, autonomous transportation, and smart cities.

Stealth Software Technologies

Stealth Software Technologies

Stealth Software Technologies is focused on the generation of research and software products focused on applied cryptography and cybersecurity.

SECUINFRA

SECUINFRA

SECUINFRA has been supporting companies in detecting, analyzing and defending against cyber attacks since 2010.

Theori

Theori

Theori tackles the most difficult cybersecurity challenges from an attacker’s perspective and conquers them as the best strategic security experts.

Velstadt Cybersecurity

Velstadt Cybersecurity

Velstadt's team of experienced professionals works on identifying vulnerabilities, analyzing threats, and developing strategies to ensure the highest level of security.

CSIRT-Gnd

CSIRT-Gnd

CSIRT-Gnd provides 24x7 Computer Security Incident Response Services to citizens, companies and government agencies in Grenada.

EyBrids

EyBrids

As a forward-thinking cybersecurity consulting firm, we believe that robust security is the foundation for innovation and growth in today’s digital landscape.