News

2015-02-25

Big Money: The US Intelligence Budget

The combined US intelligence budget in 2014 equates to the entire UK Defence budget

2015-02-25

Are Cyber War & Cyber Terrorism Insurable?

The frequency of cyber war and terrorism is no longer the risk. The magnitude of the potential damages is the real threat.

2015-02-23

Digital Future: UK Government is preparing for Robot Takeover

A report released today by the House of Lords Select Committee on Digital Skills has called on the incoming government to take seriously the threat of robots to the British economy.

2015-02-25

Who Are The Most Notorious Hacking Groups?

Lizard Squad, Anonymous, LulzSec and the Syrian Electronic Army stand out.

2015-02-24

Android malware fakes phone shutdown then steals data

Next time you turn off your Android phone, you might want take the battery out just to be certain...

2015-02-24

Cyber Soldiers: UK Announces Creation Of The 77th Battalion

Cyberspace is a strategic domain for modern warfare, for this reason, the British Government has decided to create a new cyber unit composed of cyber experts, so-called "Facebook Warriors"

2015-02-24

Dramatic Improvement in Intelligence Sharing Because of ISIS

European countries are voluntarily providing the United States with large amounts of information about their citizens, particularly as those citizens attempt to travel, the nation's top counterterrorism official said

2015-02-23

Cybercrime and the value of personal data

Put simply, the underground economy is a collection of forums, chat rooms and custom-made websites that are all designed to facilitate, streamline and industrialize cybercrime.

2015-02-24

NSA Surveillance Software Infecting Thousands of Computers Worldwide

A sophisticated spying campaign infected tens of thousands of computers worldwide with surveillance software, some embedded in hard drives, according to a report from a cybersecurity company that points toward the US National Security Agency.

2015-02-18

BMW Fixes Flaw risking 2.2 Million Cars to Break-In

German luxury carmaker BMW has fixed a security flaw that could have allowed hackers to unlock the doors of up to 2.2 million Rolls-Royce, Mini and BMW vehicles.

2015-02-18

France's Online War Has A New Cyber Security Cell

France has declared what some are calling a war on terror in the wake of the attacks on the Charlie Hebdo magazine and Hyper Cacher market, and a number of the battles are expected to be waged online. The government has announced new policies aimed at preventing cyber attacks by Islamist hacking groups and online recruitment by extremist groups targeting French youth.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Prosperon Networks

Prosperon Networks

Prosperon Networks support SMB to Enterprise networks through the provisioning of network monitoring software, customisation, consultancy and installation.

Resilient Information Systems Security (RISS)

Resilient Information Systems Security (RISS)

RISS is a research group is in the Department of Computing at Imperial College London.

APWG

APWG

APWG is the international coalition unifying the global response to cybercrime across industry, government, law-enforcement and NGO communities.

Honeynet Project

Honeynet Project

The Honeynet Project is a leading international non-profit security research organization, dedicated to investigating the latest attacks and developing open source security tools.

Xcina Consulting (XCL)

Xcina Consulting (XCL)

Xcina Consulting provides high quality business and technology risk assurance and advisory services.

SecureAppbox

SecureAppbox

SecureAppbox provide solutions that protects the communication of sensitive data as well as advice on data security and compliance with GDPR.

Calyptix Security

Calyptix Security

Calyptix Security helps small and medium offices secure their networks so they can raise profits, protect investments, and control technology.

Seadot Cybersecurity

Seadot Cybersecurity

Seadot offer cybersecurity services to organizations with a high demand for regulatory compliance and security.

JaCIRT

JaCIRT

JaCIRT is the national Cyber Incident Response Team for Jamaica, established to deliver on the mandate outlined in the GoJ’s National Cyber Security Strategy.

Ankura Consulting Group

Ankura Consulting Group

Ankura is a global expert services and advisory firm that delivers services and end-to-end solutions in a wide range of areas including cybersecurity and digital transformation.

CyberSanctus

CyberSanctus

CyberSanctus provide clients with a variety of pentest plans from the entry level starter plan, which is tailored for personal websites, to enterprise level pentests, tailored for large scale business

Brightworks Group

Brightworks Group

BrightWorks Group offer comprehensive technology operations and security operations consulting services, tailored to meet your specific needs.

StepSecurity

StepSecurity

StepSecurity provides a comprehensive security platform for GitHub Actions.

Proton

Proton

Proton provides free encrypted email, calendar, drive, password manager, and VPN services. Building a better Internet.

Scribe Security

Scribe Security

Scribe security provides end-to-end software supply chain security solutions.

ZEST Security

ZEST Security

The ZEST platform natively integrates into your technology stack to make efficient risk remediation possible.