News

2019-12-11

Bitcoin, Murder & Mafia On “Blockchain Island”

An investment project to to mine the controversial cryptocurrency Bitcoin in the EU nation of Malta has been linked to a murder.

2019-12-11

A Massive Datacenter On Single Chip

A huge data center, which would use enormous amounts of energy to crunch data in a large building, can be placed on a single computer chip.

2019-12-10

Antivirus Software Concealed Thousands Of Cybercrime Reports

Over 9,000 reports of British cybercrime were not investigated because software designed to protect the Police database labelled them a security risk.

2019-12-10

Artificial Intelligence Is Already Reshaping Our Lives

AI is revolutionising how the everyday world works, including applications from streamlining operations to informing better decision making.

2019-12-10

Finland Has A Cyber Security Standard For IoT

As consumers become more reliant on smart devices and calls for IoT regulation spread internationally, Finland has set the standard.

2019-12-10

Can Small Business Beat Cyber Attacks?

A good cybersecurity strategy is essential for any business, no matter its size, but with the severe skills shortage, what’s a small business to do?

2019-12-09

AI And IoT Have Created The AIoT

The IoT creates vast connections, AI makes these devices come alive, creating AIoT networks of devices that can communicate and process data.

2019-12-09

Darktrace Wins Lloyds Award

British cybersecurity company Darktrace has won the prestigious Lloyds Bank Business award for its pioneering work using artificial intelligence.

2019-12-06

Creating A Cyber Incident Response Policy

Incident response is an organised approach to addressing and managing the aftermath of a security breach or cyberattack. You might need it.

2019-12-06

Beware Phishing Emails

Phishing is one of the most longstanding and dangerous methods of cybercrime. It is a simple fraud to operate and consistently claims victims.

2019-12-06

Free Speech And The Detention Of Julian Assange

Is Julian Assange a journalist and is journalism a crime? Yes and No, say those who oppose his extradition to the US on spying changes.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cyber Security Network

Cyber Security Network

Cyber Security Network provide specialist cyber security recruitment services.

Cyjax

Cyjax

Cyjax monitors the Internet to identify the digital risks to your organisation, including cyber threats, reputational risks and the Darknet.

Valire Software

Valire Software

Valire provide a solution for the automated detection of internal fraud.

Lineal Services

Lineal Services

Lineal supports clients in meeting their digital forensics, cyber security and eDiscovery needs by providing bespoke solutions to complex problems.

Cyber Threat Defense (CT Defense)

Cyber Threat Defense (CT Defense)

CT Defense specialize in penetration testing and security assessments.

Q6 Cyber

Q6 Cyber

Q6 Cyber is an innovative threat intelligence company collecting targeted and actionable threat intelligence related to cyber attacks, fraud activity, and existing data breaches.

Trustify

Trustify

Trustify is a Managed Security Service Provider offering a suite of world-class Cyber Risk Management services.

Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC)

Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC)

MTS-ISAC promotes and facilitates maritime cybersecurity information sharing, awareness, training, and collaboration efforts between private and public sector stakeholders.

ABCsolutions

ABCsolutions

ABCsolutions is dedicated to assisting businesses and professionals achieve compliance with federal anti-money laundering regulations in an intelligent and pragmatic way.

Gridware

Gridware

Gridware is a specialised cybersecurity consultancy firm and an emerging global player in the cybersecurity intelligence and advisory field.

Zyston

Zyston

Zyston's solutions provide end-to-end management of your cybersecurity needs. Our range of services help protect your business where it needs it the most.

Nicoll Curtin

Nicoll Curtin

Nicoll Curtin is a global company with over 20 years of experience in connecting outstanding talent with industry leading companies within Technology, Change and Cyber Security.

Third Point Ventures

Third Point Ventures

Third Point brings deep technical expertise, a strong network of relationships, and decades of investing experience to add value to our partners throughout their journey from idea to IPO and beyond.

CampusGuard

CampusGuard

CampusGuard focuses on the cybersecurity and compliance needs of campus-based organizations including higher education, healthcare, and state and local government.

CypherEye

CypherEye

CypherEye is a next generation trust platform that advances the current state of Multi-factor Authentication (MFA) to enable highly secure, private and auditable cyber-transactions.

CASwell

CASwell

Caswell is an industry-leading OEM/ODM specializing in networking, security, SD-WAN, NFV, telecommunication and IoT applications.