News

2017-08-30

Google Launches GDPR Compliance Site

Google is launching a dedicated website designed to ensure customers understand how their data is being collected and stored in line with GDPR.

2017-08-30

US Warship Collisions Raise Cyber Attack Questions

After a series of unexplained collisions, is it possible the US Navy's Seventh Fleet has been 'pwned'?

2017-08-29

Carelessness Is Just As Risky As Deliberate Exfiltration

Panama Papers Pt.2: A Panamanian broker has accidentally exposed 52,000 financial and legal documents of wealthy individuals.

2017-08-29

N. Korea Targets S Korea’s Bitcoin Exchange.

North Korea has likely launched a cyber-attack against South Korean virtual currency exchanges in the face of heavier economic sanctions.

2017-08-28

Solutions To Combat ‘Fake News’

There may be actual solutions to the spread of fake news and there are various methods being offered to fix it.

2017-08-25

North Korean Cyber Attacks Continue

North Korean government hackers are continuing to target critical US infrastructure for cyber attacks.

2017-08-25

Driverless Truck Fleet Gets UK Trial

The AA has warned these plans could pose a significant risk to motorists, highlighting the fact that 'truck platoons' are half a football pitch long.

2017-08-25

UN Cyber Warfare Talks Collapse

It was never going to be easy: Negotiations aimed at forging an international legal framework governing cybersecurity began in 2004.

2017-08-25

Tech Giants Put Big Data To Work

The most important aspect of big data is it’s ubiquity throughout the market and availability to all businesses, large and small.

2017-08-22

Hackers Target The Shipping Industry

The shipping industry is now painfully aware that physical shipping operations are vulnerable to digital disruption.

2017-08-29

Cyber Criminals Have Access To Weapons Grade Hacking Tools

Businesses need to seriously rethink cyber defence with powerful nation-state attack hacking tools now in the hands of ordinary cyber criminals.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Ripjar

Ripjar

Ripjar is a global company of talented technologists, data scientists and analysts designing products that will change the way criminal activities are detected and prevented.

Barracuda

Barracuda

Barracuda provides a comprehensive cybersecurity platform to protect organizations from all major attack vectors that are present in today’s complex threats.

Security Industry Association (SIA)

Security Industry Association (SIA)

The SIA's mission is to be a catalyst for success​ within the global security industry through information, insight and influence.

Mi-Token

Mi-Token

Mi-Token is an advanced two-factor authentication solution that offers unparalleled security, flexibility, cost-effectiveness and ease of use.

National Association of State Chief Information Officers (NASCIO)

National Association of State Chief Information Officers (NASCIO)

NASCIO's Cybersecurity Committee focuses helps state CIOs to formulate high-level security and data protection policies and technical controls.

Jeffer Mangels Butler & Mitchell LLP (JMBM)

Jeffer Mangels Butler & Mitchell LLP (JMBM)

JMBM is a full service law firm providing counseling and litigation services in a wide range of areas including cyber security.

Cyble

Cyble

Cyble Vision enables faster detection of cyber threats and focuses on identifying and analysing the motivations, methods, capabilities and tools of adversaries.

NightDragon

NightDragon

NightDragon is a venture capital firm investing in innovative growth and late stage companies within the cybersecurity, safety, security, and privacy industry.

Cyber Defence Solutions (CDS)

Cyber Defence Solutions (CDS)

Cyber Defence Solutions is a cyber and privacy Consultancy with extensive experience in the development and implementation of cyber and data security solutions to your assets.

Eureka Security

Eureka Security

Eureka help organizations securely use any cloud data storage technology they need without having to compromise on security.

Guardey

Guardey

Guardey protects thousands of SME's environments. Whether your team works at the office, at home, at the customer or remotely. We protect your business. We do this in an accessible and affordable way.

Battery Ventures

Battery Ventures

Battery partners with talented founders and teams building category-defining businesses at all stages of growth.

X-Analytics

X-Analytics

X-Analytics is a cyber risk analytics application to create a better way for organizations to understand and manage cyber risk.

Aliro Security

Aliro Security

AliroNet is the world’s first entanglement Advanced Secure Network solution.

Price Forbes

Price Forbes

Building on more than 100 years of specialist insurance broking, Price Forbes partner with clients around the world who are looking to understand and balance today’s risk and plan for the future.

Custocy

Custocy

Custocy is a unique collaborative AI technology that identifies sophisticated and unknown (zero-day) attacks.