News

2017-02-07

Botnets Have Infiltrated The Twitterverse

Twitter bots produce spam, provide fake followers and can manipulate debates and public opinion in insidious ways that are hard to track and prevent.

2017-02-07

Lloyds Bank Cyber Attack

Following a massive DDoS attack affecting millions of customers, Lloyds Bank have sought help from the UK National Cyber Security Centre.

2017-02-07

Russia’s Attack On Web Freedom

Safe in Moscow, Edward Snowden has said very little about the Russian security apparatus, which is more intrusive than that in Europe & the USA.

2017-02-07

US And UK Agree To Take On Islamic State In Cyberspace

Trump & May: 'Deepening intelligence and security cooperation and critically.. stepping up efforts to counter Daesh in cyberspace.'

2017-02-06

'Locked-in' Patients Enabled To Communicate

A brain-computer interface can read the thoughts of patients suffering Locked-In syndrome to answer simple yes-or-no questions.

2017-02-03

Big Data Analysis – Now Used For Politics…

Big data analysis has not only been contributing to decision making in the realms of business, health, and defense, but also in politics.

2017-02-03

Why Are Hackers After Healthcare Records?

Information hacked from a Financial Institution or Bank is quickly rendered useless. Classified Healthcare data has continued value lasting a lifetime.

2017-02-01

Kaspersky Lab Employee Arrested On Treason Charges

A leading cybercrime investigator at top security firm Kaspersky Lab has been arrested in Russia where he could face charges for high treason.

2017-02-06

Autonomous Robots Will Deliver Your Lunch

Forget About Deliveroo: These robots are designed to work in a two to three- mile radius and make deliveries in 15 to 30 minutes.

2017-02-03

Stuxnet, Secrecy & The New Era of Cyber War

Should Cyber weapons be subject to international controls & protocols in the same way as nuclear and some other conventional weapons?

2017-02-06

Business Can Minimise Cybersecurity Risks And Drive Profit

CIOs are under pressure to deliver on the promise of digital technologies to transform customer-facing services & internal processes.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

SSL247

SSL247

SSL247 is Europe's leading Web Security Consultancy Firm. We enjoy long-standing partnerships with Certificate Authorities including Symantec, GlobalSign, Entrust Datacard, Comodo, Thales and Qualys.

Outpost24

Outpost24

Outpost24 provides easy to deploy and intuitive solutions to continuously identify, remediate and mitigate vulnerabilities in your network.

CipherPoint Software

CipherPoint Software

CipherPoint Software provides data-centric auditing and protection solutions for securing unstructured information

Oracle Cloud Security

Oracle Cloud Security

Oracle’s cloud security solutions enable organizations to implement and manage consistent security policies across the hybrid data center.

Cobwebs Technologies

Cobwebs Technologies

Cobwebs Technologies provide web intelligence solutions for Law Enforcement (including cybercrime), Intelligence Agencies and Federal Agencies.

Sasa Software

Sasa Software

Sasa Software is a cybersecurity software developer specializing in the prevention of file-based network attacks.

ACM-CCAS

ACM-CCAS

ACM is a UKAS-accredited certification body helping businesses around the world perform to a higher standard. Our certifications include ISO 27001 and ISO 22301.

PeckShield

PeckShield

PeckShield is a blockchain security company which aims to elevate the security, privacy, and usability of entire blockchain ecosystem by offering top-notch, industry-leading services and products.

neoEYED

neoEYED

neoEYED helps banks and fintech to detect and prevent frauds using a Behavioral AI that recognizes the users just by looking at “how” they interact with the applications.

Conquest Cyber

Conquest Cyber

Conquest Cyber builds adaptive risk management programs where innovation is most needed – within defense, intelligence, federal civilian agencies and the industrial base that supports them.

Core Sentinel

Core Sentinel

Australia's #1 Penetration Testing Service. Make Your Systems Fully Compliant With Our OSCE CREST/CISA Certified Penetration Testing.

Retruster

Retruster

Protect your users against phishing emails, ransomware & fraud with the most advanced, user-friendly, non-intrusive solution available.

Vali Cyber

Vali Cyber

Vali Cyber was founded in 2020 with the mission of addressing the specific cybersecurity needs of Linux.

Cipher Net Shield

Cipher Net Shield

Cipher Net Shield specializes in secure E-wallet solutions with a strong focus on blockchain and cybersecurity, prioritizing both transaction security and the recovery of lost capital.

AuthX

AuthX

AuthX provides secure and seamless log-in capabilities through strong authentication and integrations.

Aurascape AI

Aurascape AI

Aurascape is working on advanced cybersecurity solutions powered by grounds-up generative AI architecture.