News

2021-05-23

New Zealand Health Service Is Under Attack

Full Outage: The crippling attack on Ireland's healthcare system has some characeristcs that suggest it is being repeated in New Zealand.

2021-05-21

Dutch Cyber Security Under Threat

With its infrastructure largely run by foreign technology businesses, there is growing concern in the Netherlands over national digital autonomy.

2021-05-19

Most Cyber Security Teams Are Understaffed

Survey: While the cyber security workforce has been largely unscathed by the Coronavirus pandemic, the long term skills shortage persists.

2021-05-19

Russian Hackers Have Updated Their Techniques

Russia's hackers are technologically sophisticated & highly capable, with well-developed abilities to target almost any organisation around the world.

2021-05-18

Ireland’s Health Service Won't Pay Ransom

Ireland's Health Service has ruled-out giving in to hackers' ransom demands as healthcare systems struggle to deal with a significant cyber attack.

2021-05-18

Bitcoin Is Bad For The Environment

As the world desperately needs to cut carbon emissions, it doesn’t make sense to devote enormous energy resources to a virtual currency.

2021-05-18

The Role Of Enterprise Architecture In Cyber Defence

Learning the lessons from the unprecedented SolarWinds attack and the role that Enterprise Architecture has to play. By Rupert Colbourne

2021-05-18

Russian Spy Chief Says SolarWinds Was An Inside Job

The head of Russia’s Foreign Intelligence Service, Sergei Naryshkin, says that Western intelligence undertook the SolarWinds cyber attack operation.

2021-05-17

UPDATE: Ransom Attack On Irish Health Service Continues

Health service IT systems could take days to return to normal after being shutdown following the worst ever cyber crime attack on the Irish State.

2021-05-17

British Law To Protect Online Users

Social media firms will have to remove harmful content quickly or potentially face multi-billion-pound fines under new British legislation.

2021-05-17

Responding To Ransomware Attacks

Ransomware attacks on business are becoming much more frequent and severe. The victims can be too paralysed to make an effective response.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cato Networks

Cato Networks

Cato connects your branch locations, physical and cloud datacenters, and mobile users into a secure and optimized global network in the cloud.

APrivacy

APrivacy

APrivacy provides information and communication security products for the financial services industry.

Dataglobal

Dataglobal

Dataglobal is an industry-leading provider of Information Archiving/Governance and Unified Data Classification solutions.

Black Kite

Black Kite

Black Kite (formerly NormShield) provides comprehensive Security-as-a-Service solutions focused on cyber threat intelligence, vulnerability management and continuous perimeter monitoring.

SecureBrain

SecureBrain

SecureBrain software and services help protect against Japanese-specific cybercrime and global internet security threats such as online fraud, phishing, drive-by downloads and malware attacks.

Versa Networks

Versa Networks

Versa is a software-defined networking vendor providing an end-to-end solution that both simplifies and secures the WAN/branch office network.

Custodio Technologies

Custodio Technologies

Custodio Technologies was established as a Singaporean R&D Centre of Israel Aerospace Industries (IAI) in order to spearhead R&D activities in the field of cyber early warning.

Certis

Certis

Certis is a leading advanced integrated security organisation that develops and delivers multi-disciplinary security and integrated services.

Build38

Build38

Build38 provides the highest levels of security for mobile applications.

Sixgill

Sixgill

Sixgill, an IoT sensor platform company, builds the universal data service and smart process automation software allowing any organization to effectively govern its IoE assets.

Slice

Slice

Slice offer subscription based Cyber Insurance for small businesses.

cleverDome

cleverDome

cleverDome has created the first community built and proven model that redefines the standards for protecting the most confidential data and information of consumers in the cloud.

Schneider Downs

Schneider Downs

Schneider Downs & Co. provides accounting, tax and business advisory services through innovative thought leaders who deliver their expertise to meet the individual needs of each client.

Locuz

Locuz

At Locuz, we’ve made it our mission to help businesses like yours create an actionable digital strategy.

Unciphered

Unciphered

Unciphered was created as the first company providing services for opening locked hardware cryptocurrency wallets.

Corona IT Solutions

Corona IT Solutions

At Corona IT Solutions, our team of specialists in networking, wireless and VoIP are dedicated to providing proactive monitoring and management of your IT systems.

Heyhack

Heyhack

Heyhack is a SOC 2 Type II certified automated penetration testing platform for web apps and APIs.