News

2021-08-11

Stolen: Over $600 Million In Crypto Currencies

Decentralised Finance: $273m in Ethereum, $253m in Binace Smart Chain tokens and $85m in other currency looted from a blockhain exchange.

2021-08-11

New CSPM Report Highlights The Perceived Security Gap For Cloud Infrastructure

There could be a significant gap between the level of cloud security that you think you have and the level of protection that you actually have.

2021-08-10

Japan’s New Cyber Security Strategy

Japan's new three year national Cyber Security Strategy mentions a country that poses a threat to its national security - that country is China.

2021-08-10

Endpoint Security Is More Important Than Ever

The big increase in home working makes endpoint security critically important to protect remote workers and IT professionals. By Eileen Harrison

2021-11-12

Cyber Operations In Wartime

Policymakers and military leaders need to broaden their assumptions about how state and non-state actors will use cyber operations in future conflicts.

2021-08-10

Alarming Surge In Malicious Apps

Mobile users suffered 200% more malicious apps in the first half of 2021 compared to 2020 and its a particularly serious threat for iPhone users.

2021-08-11

Apple Uses Surveillance To Detect Child Abuse

The next generation of iOS will be set up to automatically scan connected devices to identify if they contain media featuring child sexual abuse.

2021-09-06

Pakistan’s New Cyber Security Policy

Pakistan has a new cybersecurity policy and will set up a national cyber security agency to protect its information systems & critical infrastructure.

2021-08-23

Detecting & Mitigating Cyber Attacks

Organisations can improve their security by methodically identifying & addressing known identity-related vulnerabilities, like Active Directory.

2021-08-25

NSA Warning - Avoid Public Wi-Fi

The US National Security Agency has issued guidance to government organisations with remote workers - avoid connecting to public Wi-Fi at all.

2021-09-06

An AI Can File A Patent Application

Legal Entity: A court in Australia has ruled that Artificial Intelligence systems can be legally recognised as an inventor in patent applications.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

KPMG

KPMG

KPMG s a leading provider of professional services including information technology and cyber security consulting.

Secure Recruiting International (SRI)

Secure Recruiting International (SRI)

SRI is an industry leader in Information Security , Networking, Wireless and Storage recruitment.

CyberPilot

CyberPilot

CyberPilot ApS is a Danish cybersecurity company. We work with all types of companies and organisations, both large and small, who want to achieve effective cybersecurity.

Coro Cybersecurity

Coro Cybersecurity

Coro (formerly Coronet) empowers organizations to protect against malware, ransomware, phishing, and botnets - across devices, users, and cloud applications.

Penta Security

Penta Security

Founded on its data encryption technology, Penta Security is a leading provider of web and data security products, solutions and services.

Tenzir

Tenzir

Tenzir's primary focus lies on network forensics: the systematic investigation of cyber attacks with big data analytics.

YL Ventures

YL Ventures

YL Ventures funds and supports brilliant Israeli tech entrepreneurs from seed to lead.

Global Accelerator Network (GAN)

Global Accelerator Network (GAN)

Global Accelerator Network are a highly curated community of independent Accelerators, Partners and Investors.

Guardara

Guardara

Guardara's mission is to help our customers to continuously improve in every aspect of software development.

Littlefish

Littlefish

Littlefish provide world-class, award-winning Managed IT and Cyber Security Services, delivered from our 24/7 UK service centres.

Trilateral Research

Trilateral Research

Trilateral Research provide regulatory and policy advice; develop new data-driven technologies and contribute to the latest standards in safeguarding privacy, ethics and human rights.

Appalachia Technologies

Appalachia Technologies

Appalachia is a full service Managed Services Provider with a focus on cybersecurity, backed by the best engineers.

ASRC Federal

ASRC Federal

ASRC Federal’s mission is to help federal civilian, intelligence and defense agencies achieve successful outcomes and elevate their mission performance.

Confidencial

Confidencial

Confidencial is a provider of solutions that help organizations secure their most sensitive information, regardless if that information exists inside or is shared outside the organization.

CyberSecAsia

CyberSecAsia

CyberSecAsia series conference is the one and only decision-makers gathering for CISO and info security experts in Asia.

M6iT Consulting

M6iT Consulting

M6iT Consulting is an industry-leading solution partner managing the IT requirements for a full range of companies.