News

2020-03-03

Where Is Iran's Cyber Response To It's General's Assassination?

Iran's threatened response to the US killing of their top military leader has yes to materialise, although their state- sponsored hackers are busy.

2020-03-18

Cyber Attacks Predicted For 2020 Summer Olympics

Supply Chain: The IOC is anxious to ensure that every third party organisation involved in the 2020 Games has adequate cyber security systems.

2020-03-17

New UK Cyber Force Targets Terror Groups

At Last: A specialist British cyber force of military & civilian hackers who can target hostile states and terror groups is ready to get going.

2020-03-17

Why 5G Is Going To Quickly Replace 4G

5G will unlock new applications that were simply not possible with 4G. Specifically, workplaces will no longer be defined by a physical location.

2020-03-06

Ransomware Attack On US Power Station

A major cyber-attack has hit a US gas compression facility, forcing it to shut it down for two days as it struggled to recover.

2020-03-03

Mexico’s Economy Ministry Falls Under Attack

Following damaging attacks on the banking system and the oil industry, the Mexican Government now finds itself a target for hackers.

2020-03-02

The Pope Speaks Out On The Ethics Of AI

The Vatican, the European Union and some of the most important technology companies agree that Artificial Intelligence needs an ethical dimension.

2020-03-02

Top Cybersecurity Threats & Solutions To Empower Every Business

It’s high time for businesses to get serious about cybersecurity and protect assets and clients. By Naomi Hodges of Surfshark

2020-03-19

Business Has Increased Cyber Security But Lacks Cyber Training

Buying equipment & services is easy. Taking the time to train people to implement secure processes and a risk-aware culture is harder.

2020-03-16

Iran's Cutting Edge Cyberwar Capabilities

Iran has the skills to conduct attacks against its enemies across numerous sectors, including energy, financial services & critical infrastructure.

2020-03-13

UK Government: Mobile Devices Lost & Stolen

British government employees lost 1,474 devices in 12 months, 347 were reported stolen and 183 were either lost or stolen. Many were unencrypted.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Lakeside Software

Lakeside Software

Lakeside Software is how organizations with large, complex IT environments can finally get visibility across their entire digital estates and see how to do more with less.

Global Learning Systems (GLS)

Global Learning Systems (GLS)

Global Learning Systems provides security awareness and compliance training programs for employees that effectively promote behavior change and protect your organization.

Giesecke+Devrient (G+D)

Giesecke+Devrient (G+D)

Giesecke+Devrient develop security technologies in four major areas: enabling secure payment, providing trusted connectivity, safeguarding identities and protecting digital infrastructures.

Seceon

Seceon

Seceon OTM, is a cyber security advanced threat management platform that visualizes, detects, and eliminates threats in real time.

Institute for Cyber Security Innovation - Royal Holloway

Institute for Cyber Security Innovation - Royal Holloway

The Institute for Cyber Security Innovation aims to bring together Academia, Industry and Government to be a catalyst for applied research and innovation in cyber security policy and solutions.

Prove & Run

Prove & Run

Prove & Run provides a patented software development toolchain that is specifically forged to deal with the complex security properties of sensitive software components.

FRSecure

FRSecure

FRSecure is a full-service information security management company that protects sensitive, confidential business information from unauthorized access, disclosure, distribution and destruction.

Method Cyber Security

Method Cyber Security

Method offers a Cyber Security Risk Management training course for those responsible for the security of industrial automation, control and safety systems.

jobsDB.com

jobsDB.com

jobsDB Singapore is a search engine for jobs throughout Singapore.

Glocomms

Glocomms

Glocomms is a leading specialist recruitment agency for the tech sector, providing permanent, contract, and multi-hire recruitment from our global hubs in San Francisco, New York, London and Berlin.

Stronger International

Stronger International

Stronger International provides expert cyber services and training to organizations and individuals to enhance IT and security knowledge.

Coralogix

Coralogix

Coralogix are rebuilding the path to observability using a real-time streaming analytics pipeline that provides monitoring, visualization, and alerting capabilities without the burden of indexing.

Aravo Solutions

Aravo Solutions

Your Extended Enterprise is full of hidden risks – Aravo makes them visible, measurable, and manageable.

Check Point Software Technologies

Check Point Software Technologies

Check Point Software Technologies is a leading provider of cyber security solutions to governments and corporate enterprises globally.

PureSquare

PureSquare

PureSquare exist to empower people with simple solutions for their increasingly complex digital security & online privacy needs.

Trojan Horse Security

Trojan Horse Security

Trojan Horse Security are specialists in corporate security. Our services include: Comprehensive Cyber Security Analysis, Penetration Testing, Network Security and Security Audits.