News

2018-04-13

Cyber Criminals Have Ingenious Money Laundering Methods

Cyber criminals are using a combination of cryptocurrencies, gaming currencies and micro-payments to launder $200bn of stolen money.

2018-04-13

How to Improve Cyber Security Awareness In Your Organisation

CIOs can help combat the ever-evolving threats occurring in the workplace by highlighting security issues and raising overall awareness.

2018-04-13

UK Police Cybercrime Training

British police have spent a measly £1.3m on cybercrime training for officers in the last three years, yet cyber skills are vital for modern policing.

2018-03-29

US Imposes Cyber Sanctions On Iran

Iran is protesting about US sanctions imposed on 10 citizens and a tech firm accused of cyber attacks on at least 320 universities worldwide.

2018-04-12

Police Stab Vest Detects Injury

Wearable technologies containing sensors can save lives. A smart police vest can detect an injury automatically and send an alert for help.

2018-04-12

AI Won’t Replace The Human Brain

Startup Nectome thinks it is possible to create a map of all of the brain's neuron connections, a "connectome", to make an artificial reconstruction.

2018-04-12

How to Access the Dark Web Anonymously

Are you trying to find out how to access the dark web? You will need an anoymising browser, but its unreliable, slow and you might not like it.

2018-04-11

Cambridge Analytica, Facebook & GDPR

The UK Information Commissioner has her work cut out deciding if there has been any illegality in her jurisdiction. Would it be different after GDPR?

2018-04-11

Criminal Web-Injects Can Steal Cryptocurrency

Criminals are deploying a variety of tactics to try and profit from the cryptocurrency boom, including web-injects to intercept & modify web traffic.

2018-04-11

The Cloud Is A Key To Cyber Defence

Organisations need to grasp security intelligence and act on it faster to get ahead of attackers. Cloud-based security can make that possible.

2018-04-10

Denmark: A Leader In Cyber Security

Denmark is amongst the countries that suffer from lowest numbers of cyber attacks, despite being a highly digitised nation.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Mielabelo

Mielabelo

Belgian consulting firm providing services in the security and compliance of information systems and IT service management.

ASU Online - Information Technology Program

ASU Online - Information Technology Program

The Information Technology program at ASU Online provides you with the expertise to design, select, implement and administer computer-based information solutions.

CERT-PA

CERT-PA

CERT-PA is the national Computer Emergency Response Team for Italian government institutions.

Clavister

Clavister

Clavister is a network security vendor delivering a full range of network security solutions for both physical and virtualized environments.

Cyber8Lab

Cyber8Lab

Cyber8Lab provides cybersecurity training programmes simulating real world cybersecurity incidents such as web defacement, malware, phishing, digital forensics analysis and wireless intrusion.

Entersekt

Entersekt

Entersekt is an innovator in push-based authentication and app security.

Risk Ident

Risk Ident

RISK IDENT specializes in supporting enterprises in identifying and preventing criminal activity like payment fraud, account takeovers and identity theft.

Dracoon

Dracoon

DRACOON is market leader in the German-speaking region for secure enterprise file sharing.

Newtech Recycyling

Newtech Recycyling

Newtech Recycyling specializes in the removal and disposal of IT infrastructure which has reached the end of its life cycle.

Kindus

Kindus

Kindus is an IT security, assurance and cyber security risk management consultancy.

US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber Command is responsible for Navy information network operations, offensive and defensive cyberspace operations, space operations and signals intelligence.

Defentry

Defentry

Defentry have created an Ecosystem that lets our users easily monitor, train and resolve their digital security issues.

The IoT Academy

The IoT Academy

The IoT Academy is a reputed Ed-Tech Institute that provides training in emerging technologies such as embedded systems, the Internet of Things (IoT), Data Science and many more.

Edgio

Edgio

Edgio provides unmatched speed, security, and simplicity at the edge through globally-scaled media and applications platforms.

Netox

Netox

Netox is a comprehensive IT service provider that combines IT support services, IT solutions and specialist services; specializing in cybersecurity solutions.

IS4IT Kritis

IS4IT Kritis

IS4IT is your partner for the successful planning, introduction and implementation of company-specific information security concepts.