News

2016-11-04

Healthcare Industry Lacks Basic Security Knowhow

Levels of security awareness in Healthcare are lower than average and this sector is particularly vulnerable to social engineering style attacks.

2016-11-04

New IoT Chips See, Think & Act Autonomously

The new generation of chips powering the Internet of Things have some quite remarkable capabilities.

2016-11-04

How Did WikiLeaks Get Clinton's Emails?

Julian Assange strongly denies US accusations that Russia is the source of the flood of hacked secret political emails released by Wikileaks.

2016-11-02

No Need To Shoot Down Drones – Just Hijack Them

It's possible to hijack a wide variety of radio- controlled aircraft and other devices that use a popular wireless transmission technology.

2016-11-02

US Banking Regulator Suffers A Major Breach of Confidential Data

Careless Or Malicious? Retired employee departs with sensitive information on a portable device that has now gone missing.

2016-11-02

More Insecure Email: Clinton Camp Blasts FBI Director

FBI Director James Comey has made a controversial decision to release new details of its investigation into Hillary Clinton’s private email server.

2016-11-02

MI5 Head: Russia A Growing Threat To UK

MI5 says Russia poses an increasing threat to the stability of the UK and is using all the sophisticated tools at its disposal to achieve its aim.

2016-11-01

GCHQ’s Cyber Insiders Summer School

How to be a Cyber Spy: Learn from 'world-class experts’ in a ‘cooperative’ and ‘relaxed’ environment in a state-of the- art facility in Cheltenham.

2016-11-01

Shadow Brokers Release Secret List Of NSA-Compromised Servers

The Shadow Brokers hacking group who claimed to have leaked a portion of the NSA’s hacking tools and exploits is back with a Bang.

2016-11-01

UK To Increase National Cyber Defences

Britain invests £1.9 billion in a new strategy to protect national infrastructure with stronger cyber defences and to strike back when attacked.

2016-11-03

Google AI Invents Its Own Cryptographic Algorithm

Google Brain has created two artificial intelligences that evolved their own cryptographic algorithm to protect themselves from a third AI.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cifas

Cifas

Cifas are leaders in fraud prevention, working closely with UK law enforcement partners.

Fidelis Security

Fidelis Security

Fidelis Security is a leading provider of extended threat detection and response (XDR) solutions for your security operations.

Flexera

Flexera

Flexera is reimagining the way software is bought, sold, managed and secured.

Ntrepid

Ntrepid

Ntrepid products provide protection from web threats and enable organizations to safely conduct their online activities.

Idaho National Laboratory (INL)

Idaho National Laboratory (INL)

INL is an applied engineering laboratory dedicated to supporting the US Dept of Energy's missions in energy research, nuclear science and national defense including critical infrastructure protection.

Hexnode MDM

Hexnode MDM

Hexnode MDM is an award winning Enterprise Mobility Management vendor which helps businesses to secure and manage BYOD, COPE, apps and content.

Buglab

Buglab

The Buglab contest and Vigilante Protocol help companies all over the world to discover and fix vulnerabilities on their digital solutions or assets.

Cyber Risk Institute (CRI)

Cyber Risk Institute (CRI)

CRI is a not-for-profit coalition of financial institutions and trade associations working to protect the global economy by enhancing cybersecurity and resiliency through standardization.

Integrity

Integrity

Integrity is a PCI QSA and ISO 27001 certified company specialized in Information Security and IT Consulting.

Pires Investments

Pires Investments

Pires is building an investment portfolio of high-tech businesses across areas such as Artificial Intelligence, Internet of Things, Cyber Security and Augmented/Virtual Reality.

Nisos

Nisos

Nisos provides unrivaled protection of your reputation and assets through the practice of Active Defense.

NGN International

NGN International

NGN International is a full-fledged systems integrator and managed security services provider established in 2015 in Bahrain.

Wabbi

Wabbi

Wabbi’s continuous security platform centralizes, automates and orchestrates security governance and vulnerability management to empower development teams to own appsec.

Acrisure

Acrisure

Acrisure is powered by the best of human and high-tech and offers insurance, reinsurance, real estate, cyber and more solutions to millions of clients around the world.

Cytek

Cytek

Cytek is a leading provider of cybersecurity and HIPAA compliance for dental practices and other industries.

XY Cyber

XY Cyber

XY Cyber enable Generative AI for Cyber Operations. We simplify the complex world of cyber threats into actionable strategies, empowering your defense with AI-powered solutions.