News

2015-12-01

Presidential Candidate John McAfee Talks Cyber

When it comes to eccentric personalities and colorful pasts, Donald Trump has nothing on John McAfee.

2015-12-01

IoT Attacks and Evasion Will Characterize 2016

The Internet of Things along with predictions of new malicious tactics & strategies will create unique challenges in 2016.

2015-12-05

IBM's CEO On Hackers: 'Cyber Crime Is The Greatest Threat To Every Company In The World'

"... cyber crime, by definition, is the greatest threat to every profession, every industry, every company in the world.”

2015-12-04

Reverse ATM Fraud: How It Works

Russian hackers have adopted a new technique, dubbed the Reverse ATM Attack to steal Millions of dollars from ATMs of financial institutions.

2015-11-27

ISIS Video Threatens US Capital

ISIS propagand video stirs up fears of a repeat 9/11 attack.

2015-11-27

Nuclear Weapons Subs Could Be Vulnerable to Cyber-attack

Britain’s Trident nuclear weapons system may turn out to be obsolete or unusable because of vulnerability to 'full spectrum' cyber assault.

2015-12-04

CIA Say Edward Snowden 'taught ISIS to avoid detection'

Former CIA deputy director claims Snowden is directly implicated in the rapid expansion of ISIS in the months after his first leaks in 2013.

2015-11-25

Did China Authorize Major High Level Hack on US & It’s Allies?

High Alert: Google announces discovery of a phishing scam based in China, targeting email passwords of senior government officials.

2015-11-25

Google's New AI System is 'Machine Learning' Breakthrough

Google say it's TensorFlow system is theserious implementation of a framework for 'deep learning' allowing machines to learn abstract concepts.

2015-11-24

UK Crime Rate Rises Sharply as Cybercrime is Included

It is estimated there were 2.5m “computer misuse” incidents last year, where a victim’s computer is infected by a virus.

2015-11-25

De-escalation Is The Answer To Growing Cyber Tension

Failure to follow through on the US-China cyber non-agression agreement could be the first step in history toward an inevitable world cyberwar.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Tendo Solutions

Tendo Solutions

Tendo Solutions provides intelligence, security, forensics and risk solutions to clients across different sectors and jurisdictions.

Titania

Titania

Titania provide network security and compliance software. Find your Network Security gaps before hackers do with our security & compliance tools.

Repository of Industrial Security Incidents (RISI)

Repository of Industrial Security Incidents (RISI)

RISI is a database of cyber security incidents that have (or could have) affected process control, industrial automation or SCADA systems.

Golden Frog

Golden Frog

Golden Frog is a Virtual Private Network services provider offering secure encrypted access to the internet.

DigitalXRaid

DigitalXRaid

DigitalXRAID is driven and motivated to ensure the bad guys don’t win. We’re dedicated to providing our clients with state-of-the-art cyber security solutions.

Specops Software

Specops Software

Specops Software is a leading password management and authentication solution vendor.

DataCloak

DataCloak

DataCloak is an innovation company that focus on providing enterprise data-in-motion security solutions based on zero-trust security technology.

eXate

eXate

eXate provides pioneering technology that empowers organisations to protect, control and manage their sensitive data centrally, providing a complete data privacy solution.

Havoc Shield

Havoc Shield

Havoc Shield is an all-in-one information security platform that includes everything a growing team needs to secure their remote workforce.

Communicate Technology

Communicate Technology

Communicate Technology are IT, telecoms and cyber-security specialists, keeping over 500 businesses and 50,000 users connected and secure across the UK.

AnyTech365

AnyTech365

AnyTech365 is a leading European IT Security and Support company helping end users and small businesses have a worry-free experience with all things tech.

SpireTec Solutions

SpireTec Solutions

SpireTec Solutions is an IT management training company offering 1500+ courses with state of art training facilities backed by a team of industry experts in various domains including cybersecurity.

Axiata Digital Labs

Axiata Digital Labs

Axiata Digital Labs is the technology hub of Axiata Group Berhad Malaysia which is one of the leading groups in telecommunication in Asia.

Buchanan Technologies

Buchanan Technologies

Buchanan Technologies is a leading IT consulting and outsourcing services firm. Our methodology transforms everyday technology investments into streamlined, secure and scalable solutions.

Omega Systems

Omega Systems

Omega Systems is a leading managed service provider (MSP) and managed security service provider (MSSP) to mid-market organizations.

Togggle

Togggle

Togggle offers seamless identity verification solutions and distributed infrastructure, enabling organizations to combat fraud and ensure compliance with data protection regulations.