News

2022-05-14

Bitcoin Tanks

Widely used to facilitate cyber crime, frustrate law enforcement, evade regulation and guzzle energy, it turns out Bitcoin is also a lousy investment.

2022-05-16

Investment Scams Are Increasing

Britain's financial regulator is warning people to beware of fake financial advisers offering investment schemes via online meeting platforms.

2022-05-16

Threat Hunting Solutions

It's crucial for organizations to utilize proactive cyber threat hunting in building, securing and maintaining their security infrastructure.

2022-05-16

Costa Rica Declares A State Of Emergency Following Cyber Attacks

The Conti cyber crime group are holding the government of Costa Rica to ransom in a wide -ranging attack that has knocked state agencies offline.

2022-05-13

Wanted: Access To Social Media Data

Despite its enormous influence and large scale manipulation by malicious actors, Social Media remains opaque and resistant to detailed analysis.

2022-05-13

Some Apps Come Loaded With Malware

App stores share a common threat profile. Apps loaded with malware present the most immediate risk to millions of unsuspecting users.

2022-05-10

The Cyber Security Investment Boom Continues

M&A activity grew to over $70 billion in 2021and reached almost $27 billion by the end Q1 2022, but there are signs investors are getting cautious.

2022-05-10

Special Measures To Deal With Quantum Technology

The US wants to speed up the domestic development of quantum technology, whilst adddressing the risks it presents to secure communications.

2022-05-09

Anonymous Launch An Attack On Rosneft

The hacking collective Anonymous claim they have stolen 20 Terabytes of data from a major Russian oil company, knocking its systems offline.

2022-05-09

India Issues A Directive For Reporting Cyber Incidents

The Indian government has issued a directive requiring organisations to report cyber security incidents to CERT-IN within six hours of their discovery.

2022-05-09

A History Of Cyber Security

Understanding the history of cyber security may help shed some light on how to take effective steps to keep Internet users safe today.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

RedTeam Security

RedTeam Security

RedTeam Security is a provider of Penetration Testing, Social Engineering, Red Teaming and Red Team Training services.

CERT-SE

CERT-SE

CERT-SE is the national and governmental Computer Security Incident Response Team of Sweden.

Galvanize

Galvanize

Galvanize is a leading provider of award-winning, cloud-based security, risk management, compliance, and audit software for some of the world’s largest organizations.

Lynx Technology Partners

Lynx Technology Partners

Lynx Technology Partners is a full service, full life-cycle risk-based security consulting firm.

Calian Group

Calian Group

Calian is a diverse Canadian company offering professional services in areas including Advanced Technologies, Health, Learning and IT & Cyber Solutions.

Metrarc

Metrarc

Metrarc has developed a ground-breaking technology called ICMetrics™ for deriving secure encryption keys from the properties of digital systems without the need to store any of the encryption keys.

Intercast Global

Intercast Global

Intercast's mission is to be a strategic resource to our clients in Risk Reduction. We are a global leader in cyber security staffing and consulting to the enterprise.

Verizon

Verizon

Verizon is a leader in IT technology solutions - Verizon Cloud, Networking, Security, Mobility, Machine-to-Machine (M2M), Advanced Communications and Professional Services.

HADESS

HADESS

We are "Hadess", a group of cyber security experts and white hat hackers.

SafeBase

SafeBase

Safebase provide the infrastructure for Trust Communication. Our Trust Center enables Security and Sales teams to share and automate access to security, compliance, and privacy information.

Reality Defender

Reality Defender

Reality Defender stops deepfakes before they become a problem. Our proprietary deepfake and generative content fingerprinting technology detects video, audio, and image deepfakes.

Ionize

Ionize

Ionize offers solutions to help you uplift your capability across the full-spectrum of cyber security - assessment, remediation, monitoring, governance and ongoing education.

Eclypses

Eclypses

Eclypses has a disrupting cyber technology, offering organizations an advanced data security solution called MicroToken Exchange (MTE).

Longbow Security

Longbow Security

Longbow automates root cause for your application and cloud risks, enabling teams with intelligent remediation actions that reduce the most risk with the least effort.

M6iT Consulting

M6iT Consulting

M6iT Consulting is an industry-leading solution partner managing the IT requirements for a full range of companies.

CyberForceHQ

CyberForceHQ

CyberForce helps cyber security professionals take real-world tests, get ranked and get paid better. It's that simple.