News

2021-03-02

Five Steps For Managing EdTech Security Risks

EdTech companies have a special responsibilty to protect their users, who are mostly adolescents & children, from online threats. By Angela Baker

2021-03-01

Three Reasons The Security Industry Is Protecting The Wrong Thing

For too long organisations have been focusing on protecting their network, when they should have been protecting their data. By Paul German

2021-03-02

Russian Hackers Make A Sustained Attack On France

Leading French companies, government agencies and City authorities have fallen victim to a 'supply chain' attack similar in execution to SolarWinds.

2021-03-01

Microsoft Releases Free Tool For Hunting SolarWinds Malware

Microsoft is open-sourcing the CodeQL queries tool it used to investigate the impact of malware planted in the SolarWinds Orion software updates.

2021-02-26

New Solutions For Zero-Day Attacks

Emergency Patches: Defending against zero-day attacks is one of the most fundamentally challenging security problems yet to be solved.

2021-02-26

Social Media’s Troublesome Influence On Politics

Social media platform architectures are not primarily designed for democratic discourse, yet they are heavily used for political purposes.

2021-02-25

Australia Makes Google & Facebook Pay

Following an ugly confrontation, Google and Facebook are now required to negotiate with news outlets to pay for their content, or face arbitration.

2021-02-25

GCHQ Jammed ISIS Drones & Servers

A secret cyber operation which involved disabling drones, jamming mobile phones and targeting computer servers to block online propaganda.

2021-02-24

Cyber Security Is Crucial For Maritime Shipping

Cyber attacks targeting ocean transport are growing exponentially and present great risks to the safety of crews, vessels, cargoes and ports.

2021-02-23

Cyber Security Training Goes Gaming

A scenario-based, gamified learning tool that drives high levels of engagement through popular elements used widely in the video gaming world.

2021-02-23

Tracking Modern Slavery On The Dark Web

Human trafficking is law enforcement's biggest challenge.This vile trade goes on hidden from sight on the Dark Web and includes children.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Q-CERT

Q-CERT

Q-CERT is the National Computer Security Emergency Team of Qatar.

Conscia

Conscia

Conscia provides IT infrastructure solutions and 24/7 services in network, data center, security and mobility.

SecureNinja

SecureNinja

SecureNinja provides professional training, certifications & professional services related to all facets of Information Technology and Cyber Security.

6point6

6point6

6point6 is a technology consultancy with strong expertise in digital transformation, emerging technology and cyber security.

NightDragon

NightDragon

NightDragon is a venture capital firm investing in innovative growth and late stage companies within the cybersecurity, safety, security, and privacy industry.

Query.ai

Query.ai

At Query.AI, we are committed to helping companies unlock the power of their security data, so they are empowered to meet security investigation and response goals while simultaneously reducing costs.

iSTORM

iSTORM

iStorm specialise in supporting organisations who require a range of Privacy, Security and Penetration testing related services.

Halogen Group

Halogen Group

Halogen Group is the leading Security Solutions Provider in West Africa. Services encompass Physical Security, Electronic Security, Virtual & Cyber Security, Risk Assessments and Training.

Acora

Acora

Acora provide a range of best-in-class managed services, Microsoft-centric business software, and cloud solutions designed to help mid-market organisations succeed in the digital economy.

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).

Moonsense

Moonsense

Moonsense is on a mission to level the playing field in the fight against online fraud.

Exacom

Exacom

Exacom is a leading provider of multimedia logging/recording solutions across public safety, government, DoD, energy, utilities, transportation, and security applications.

EPAM Systems

EPAM Systems

Since 1993, EPAM Systems has leveraged its advanced software engineering heritage to become a leading global digital transformation services provider.

CLEAR

CLEAR

With more than 17 million members and a growing network of partners across the world, CLEAR's identity platform is transforming the way people live, work, and travel.

FoxPointe Solutions

FoxPointe Solutions

FoxPointe Solutions is a full-service cyber risk management and compliance firm.

Automotive Information Sharing & Analysis Center (Auto-ISAC)

Automotive Information Sharing & Analysis Center (Auto-ISAC)

Auto-ISAC provides a forum for companies to analyze and identify threats sooner and share solutions that enhance vehicle cybersecurity.