News

2016-10-31

2016 Trends in Cyber Crime

According to Europol, the volume, scope and cost of Cybercrime have reached very high levels, and are set to get even higher.

2016-10-31

Work Traveling - You’re a Prime Hacker Target

There’s one very important thing to worry about while traveling in unfamiliar places: the security of your email.

2016-10-29

DDoS: Deceptive Denial Attacks

Increasingly sophisticated techniques deployed by attackers using DDOS methods are making the reported size of such attacks redundant.

2016-10-28

Internet of Insecure Things

Nightmare: The Internet of Things just keeps getting murkier and more problematic.

2016-10-28

Smartphone “Video Jacking” From Power Sockets

Major smartphone brands are vulnerable to the hacking threat called “video jacking' when plugged into public charging stations.

2016-10-28

Yes, US Voting Machines Are Vulnerable To Hacking

It's not a hypothetical security problem and Russian hackers have already successfully undermined democratic processes in Ukraine.

2016-10-28

Europol Warning: Crypto-Ransomware Threat

Crypto-ransomware is now the biggest malware threat facing law enforcers, according to the latest annual Europol Report on the threat landscape.

2016-10-27

How To Win The Cyberwar Against Russia

Russia’s election-year hacking of the US political system is an unprecedented situation for the American national security establishment.

2016-10-27

Meet The Fancy Bears

A mysterious group of Russian hackers, known by several different names, are perpetrating a string of high profile and politically motivated hacks.

2016-10-27

Christmas Is Cancelled: EU Running A Big Cyberwar Simulation

With growing tension over domestic terror attacks as well as on the borders with Ukraine & the Baltic states, ENISA is gaming a Christmas cyberwar.

2016-10-25

Using The Internet Competitor Analysis Effectively (£)

The web is full of massive amounts of data and analysis that can be used to clarify and offer focus to your market space.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Okta

Okta

Okta is an enterprise-grade identity management service, built from the ground up in the cloud to address the challenges of a cloud-mobile-interconnected world.

RSA Security

RSA Security

RSA provide cybersecurity products for Threat Detection and Response, Identity and Access Management, Governance, Risk and Compliance, and Fraud Prevention.

FireMon

FireMon

FireMon is the only agile network security policy platform for firewalls and cloud security groups providing the fastest way to streamline network security policy management.

First Response

First Response

First Response is a Cyber Incident Response and Digital Forensic Investigation company.

Critifence

Critifence

Critifence provides unique Cyber Security solutions designed for Critical Infrastructure, SCADA and Industrial Control Systems.

Wind River

Wind River

Wind River delivers the technology and expertise that enables the deployment of safe, secure, and reliable intelligent connected systems.

ESTsecurity

ESTsecurity

ESTsecurity is a leading company in cyber security providing intelligent security solutions to make world more secure.

Centurion Information Security

Centurion Information Security

Centurion Information Security is a consulting firm based in Singapore that specialises in penetration testing and security assessment services.

StepStone

StepStone

StepStone is one of the leading online job platforms in Germany, and other countries, covering all industry sectors including IT and cybersecurity.

GM Security Technologies

GM Security Technologies

GM Security Technologies provides leading managed security services of the highest quality to every type of individual and organization in Puerto Rico, Caribbean and Latin America.

FAIR Institute

FAIR Institute

The FAIR Institute is a non-profit professional organization dedicated to advancing the discipline of measuring and managing information risk.

Accolite Digital

Accolite Digital

Accolite is an innovative, design thinking software company that guarantees seamless digital experiences with maximum results.

VCG Group

VCG Group

VCG provides everything you need for the design, implementation and management of data centres, cyber-secure enterprise networks, cloud and connectivity services.

Red Access

Red Access

Red Access provides the first SaaS-based platform to protect web browsing from cyber threats on any browser and any in-app while ensuring frictionless user experience.

MoogleLabs

MoogleLabs

MoogleLabs leverage AI/ML, Blockchain, DevOps, and Data Science to come up with the best solutions for diverse businesses.

Sev1Tech

Sev1Tech

Sev1Tech is a leading provider of IT modernization, cloud, cybersecurity, engineering, fielding, training, and program support services.