News

2021-05-17

The Next E-Industrial Revolution

Our economic and societal structures have evolved around assumptions that will no longer be valid once technology reaches this milestone.

2021-05-15

Pipeline Ransom Has Been Paid

Darkside hackers have been paid $5 million to restore operations after a ransom attack paralysed fuel supplies across the US Eastern seaboard.

2021-05-13

Stop Taking Risks Online

Here are seven risky online habits you should stop right now, plus advice on better habits that can help keep you and your family safe online.

2021-05-14

Ransomware Attack On Ireland's Health Service

The Irish Health Service Executive has shut down IT systems and cancelled appointments after attempts to access data following a ransom attack.

2021-06-01

Can Ethical AI Become A Reality?

The ethical, social and legal aspects of AI systems must be better understood if the many potential negative consequences are to be avoided.

2021-05-19

Maritime Shipping Is An Ideal Target For Ransom

The maritime industry is dependent on just-in-time supply chains, often with outdated technology, making an attractive target for cyber criminals.

2021-05-25

Google Plans To Eradicate Cookies

Regulators and rivals are suspicious of Google’s disruptive plan to rewrite the rules of online advertising in the name of protecting user privacy.

2021-05-25

Cyber Security For Small Business

Blok: A specialist new cyber security service provider is to focus on cyber criminals who target small businesses and the self-employed.

2021-06-03

Vodafone Using Google Cloud To Retain Customers

Vodafone is working with Google on a public cloud-based CRM platform that will share their user data internationally. How secure is that?

2021-06-02

Spies Are Being Made Redundant By Technology

Human spies are becoming redundant and being replaced by technology. Soon, the Internet of Things will become the new 007 (£).

2021-06-03

Electronic Espionage Will Use AI Instead Of Spies

The British spy agency GCHQ has produced a roadmap for how they intend to make ethical use Artificial Intelligence to replace human operatives.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Okta

Okta

Okta is an enterprise-grade identity management service, built from the ground up in the cloud to address the challenges of a cloud-mobile-interconnected world.

IPVanish

IPVanish

IPVanish has its roots in over 15 years of network management, IP services, and content delivery services. Now we're bringing these finely honed skills to VPN.

Post-Quantum

Post-Quantum

Post-Quantum offer a unique, patented quantum-resistant encryption algorithm that can be applied to existing products and networks.

Wireless Logic

Wireless Logic

Wireless Logic delivers a range of secure and resilient value-added M2M/IoT managed services that empower remote devices to communicate cost-effectively, two ways.

Loki Labs

Loki Labs

Loki Labs provides expert cyber security solutions and services, including vulnerability assessments & penetration testing, emergency incident response, and managed security.

Visible Statement

Visible Statement

Visible Statement is a computer-based delivery system designed to insure the retention and recall of your most important security training messages.

Deduce

Deduce

Deduce use a combination of aggregate historical user data, identity risk intelligence, and proactive alerting to deliver a robust identity and authentication solution.

SecureDrives

SecureDrives

Passwordless Authentication & Encrypted Data Storage Solutions from SecureDrives. We are enabling organisations to work safely and securely, using technology driven solutions.

PlexTrac

PlexTrac

PlexTrac is a cybersecurity reporting and workflow management platform that supercharges security programs, making them more effective, efficient, and proactive.

BaXian Group

BaXian Group

BaXian AG is an international consulting company specializing in IT security, data analytics, risk management and compliance.

eCapital

eCapital

eCAPITAL is a leading venture capital firm that provides early to growth stage funding to technology companies in fields including software & information technology, cybersecurity and industry 4.0.

Zyber 365

Zyber 365

Zyber 365 are providing a robust, decentralized, and cyber-secured operating system which adheres to the fundamental principles of environmental sustainability.

Scality

Scality

Scality storage unifies data management from edge to core to cloud. Our market-leading file and object storage software protects data on-premises and in hybrid and multi-cloud environments.

XONA

XONA

XONA is The Zero Trust user access platform for the OT enterprise. Secure operational access to critical systems - from anywhere.

Downdetector

Downdetector

Downdetector helps people all over the world understand disruptions to vital services such as the internet, social media, web hosting platforms, banks, games, entertainment, and more.

TisOva

TisOva

TisOva is an innovative cybersecurity startup dedicated to addressing the growing issue of online scams targeting students.