News

2017-11-03

M15 Issues A Threat Warning

MI5's Director General says that Britain is facing an unrelenting offensive from a growing pool of UK jihadist extremists.

2017-11-01

Microsoft Cloud Is Hosting US Spy Data

Outsourced: Microsoft’s secret cloud is a physically isolated infrastructure located in a secure facility operating under cleared personnel.

2017-11-01

Hillary Clinton’s Cyber Warfare Warning

The US 2016 elections show that the tools are there for a foreign power to undermine citizens’ faith in their leaders and their democracy.

2017-11-01

‘Bad Rabbit’ Cyber Attack Hits Russia & Ukraine

Malware shuts down Russia's main news agency and Ukraine's air transport system in a well co-ordinated campaign.

2017-10-30

UK Health Service Should Have Prevented WannaCry Attack

NHS hospitals & patient data were left vulnerable to a major ransomware attack because cybersecurity recommendations were not followed.

2017-10-31

A New IoT Botnet Storm Is Coming

The cyber storm clouds are gathering. A new Botnet is recruiting IoT devices at a far greater pace and with more potential damage than Mirai.

2017-10-30

Iran Responsible For Cyber Attack On British Parliament

A sustained attack that compromised over 90 MPs Email accounts is thought to be Iran’s first act of cyberwarfare against Britain.

2017-10-31

Microsoft Chief Says N. Korea Was Behind 'WannaCry'

Brad Smith confirms N. Korea was behind the devastating WannaCry ransomware attack that temporarily crippled UK Healthcare organisations.

2017-10-31

Israeli Spies Hacked Kaspersky

Israeli agents hacked Kaspersky to provide the crucial evidence to ban the cybersecurity company from supplying the US government.

2017-11-13

AI Can Guess Your Password

A new application of artificial intelligence & deep learning in information security focuses on more efficiently guessing passwords. It seems to work.

2017-11-02

Insurance Will Reduce Cyber Losses

The increasingly serious and large-scale nature of cyberattacks is creating problems for companies and clients of all sizes and on all levels.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

GigaOm

GigaOm

GigaOm's mission is to provide enterprises with information and analysis to help them make better decisions about technology.

CERT Polska

CERT Polska

CERT Polska is the first Polish computer emergency response team and operates within the structures of NASK (Research and Academic Computer Network) research institute.

Ethio-CERT

Ethio-CERT

National Cyber Emergency Readiness and Response Team of Ethiopia.

Infowhiz solutions

Infowhiz solutions

Infowhiz provides solutions for backup/disaster recovery and network security.

J2 Software

J2 Software

J2 Software is a leading African Information Security and ICT business providing information security, governance, risk and compliance solutions.

NSHC

NSHC

NSHC is a provider of mobile security solutions, cyber security consulting and training, and offensive research.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Fortalice

Fortalice

Fortalice provide customizable consulting services built on proven methodology to strengthen your business cyber security defenses.

Tokio Marine HCC

Tokio Marine HCC

Tokio Marine HCC is a leading specialty insurance group with a Financial and Professional product line including Tech and Cyber.

Intersistemi Italia

Intersistemi Italia

Intersistemi is a leading Italian company in the field of information technology integration and digital transformation including cybersecurity.

Maritime Cyber Threats Research Group - University of Plymouth

Maritime Cyber Threats Research Group - University of Plymouth

The Maritime Cyber Threats research group of the University of Plymouth is focused on investigating marine cyber threats and researching solutions.

Dataships

Dataships

We help companies automate their privacy compliance while building healthy, transparent data relationships with their customers.

SensCy

SensCy

SensCy is a Trusted Guide for Sensible Cybersecurity for small and medium-sized organizations.

ASPIA InfoTech

ASPIA InfoTech

ASPIA Infotech is a leading Information and cybersecurity organization focused on innovative approaches to avert targeted attacks.

Ignite Cyber

Ignite Cyber

IGNITE Cyber is focused on enabling secure technology adoption through intelligent business decisions. We are focused on providing a secure and stable business environment for everyone.

Acumenis

Acumenis

At Acumenis, we help organisations of all sizes to manage information security effectively. Our key services are penetration testing, ISO 27001 implementations, and security