News

2017-05-15

The Reality is Everyone Hacks… Everyone

Kaspersky: When it comes to state-sponsored hacking, espionage and propaganda, no country should be presumed innocent.

2017-05-15

Facebook Pays For Fake News Ads In UK Press

Facebook is under fresh political pressure to tackle fake news in the run up to the UK general election.

2017-05-15

National Security Chief Talks About The UK’s Cyber Dangers

The UK National Cyber Security Centre's Chief Executive Ciaran Martin talks about the Cyber threat to the UK and what is being done about it.

2017-05-15

Darktrace Forms Cybersecurity Partnership With Siemens

A new strategic partnership to bring cutting-edge cyber defense for operational technology to electric utilities and the oil & gas industry.

2017-05-13

Massive Ransom Attack Hits 99 Countries

Biggest Ransomware Attack In History: British Healthcare, Russian and Spanish Telecoms, US Logistics & critical infrastructure worldwide taken down.

2017-05-12

Cyber Spies Go Mainstream

Cyber espionage appears to have hit the mainstream as the most popular attack method in the public sector, education & manufacturing industries.

2017-05-12

Macron Hackers Linked To Russian Intelligence

President Macron's campaign team used some effective countermeasures to diminish the impact of a stolen data dump on their candidate.

2017-05-12

Cybersecurity Has A Metrics Problem

Building security metrics, measuring risk and improving cyber incident communications in your organisation aren’t “one and done” processes.

2017-05-12

Hackers Stole A £60,000 BMW

Using only a signal boosting device hidden in a plastic bag, thieves were able to unlock a modern BMW car and drive away.

2017-05-11

NATO Cyber War Games 2017: Czechs Win

The Czech team won Locked Shields, NATO's international live-fire cyber defence exercise.The US Team were only midfield.

2017-05-10

The Cybersecurity Threats That Keep Banks Alert

People in charge of vast volumes of valuable financial data are under increasing pressure to keep customer data safe from hackers & fraudsters.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ANS Group

ANS Group

ANS are a strong team of straight-talking tech and business experts. Our mission is to make digital transformation accessible to all.

Safetica

Safetica

Safetica Technologies is a Czech software company that delivers data protection solutions for businesses of all types and sizes.

North European Cybersecurity Cluster (NECC)

North European Cybersecurity Cluster (NECC)

NECC promotes information security and cybersecurity-related cooperation and collaboration in the Northern European region in order to enhance integration into the European Digital Single Market.

ProcessUnity

ProcessUnity

ProcessUnity is a leading provider of Third-Party Risk Management software, helping companies remediate risks posed by third-party service providers.

MicroSec

MicroSec

MicroSec is a company specializing in IoT security. We focus on bringing enterprise grade security to IoT and embedded systems.

Clear Skye

Clear Skye

Clear Skye, an Identity Access and Management (IAM) software company, reimagines enterprise identity access and risk management software to make a complicated problem easier to manage.

GoVanguard

GoVanguard

GoVanguard is an boutique information security team delivering robust, business-focused information security solutions.

MillenniumIT ESP (MIT ESP)

MillenniumIT ESP (MIT ESP)

MillenniumIT ESP provides solutions and services around Core Infrastructure, Cloud, Cyber Security, Enterprise Applications, Intelligent Automation and Data, Smart Buildings, and Managed Services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Albania Lab

Albania Lab

Albania Lab is a consulting company focused on the development and delivery of digital solutions and IT services including cybersecurity.

Centroid

Centroid

Centroid is a cloud services and technology company that provides Oracle enterprise workload consulting and managed services across Oracle, Azure, Amazon, Google, and private cloud.

ArmorPoint

ArmorPoint

ArmorPoint redefines the traditional approach to cybersecurity by combining network operations, security operations, and SIEM technology in one platform.

SecurityBridge

SecurityBridge

SecurityBridge provide a cybersecurity connection between our customers’ IT departments, the forward-facing business services, and their SAP applications.

iTRUSTXForce

iTRUSTXForce

iTRUSTXForce is a global provider of DigitalX (cybersecurity, privacy, and digital trust) services. We offer comprehensive services that focus on delivering outcomes for our clients.

Sasken Technologies

Sasken Technologies

Sasken’s Cybersecurity Services enables enterprises to develop, maintain, and take digital products to the market with security postures that empower operational excellence.

Qryptonic

Qryptonic

Qryptonic pioneers next-generation cybersecurity by leveraging the unparalleled capabilities of quantum computing to defend against evolving threats.