News

2019-11-06

Reshaping The Future Of War With Malware

As conflict in the Middle East surges, some analyst think that malware can be a useful tool of diplomacy to de-escalate regional conflict.

2019-11-05

Fraud And The Dark Side Of AI

AI-derived algorithms that can create new data from existing datasets are being used by criminals to create convincing deepfakes and steal money.

2019-11-08

Easy Cyber Knowledge Ch.5 : Robotics AI And BioTech

The latest instalment addresses the history and current capabilities of Robotics, AI, Bio-Technology and more… By Alfred Rolington

2019-11-05

Hackers Demand Ransom After Stealing Johannesburg's Data

The attack on South Africa’s financial centre, accounting for 16% of national GDP has delivered a noticeable blow to the country’s economy.

2019-11-04

2020 Will Be A Landmark Year For AI

Ways are being found to fuse Artificial Intelligence with other systems more effectively. Transport, healthcare, finance & cybersecurity are in play.

2019-11-04

Russia Will Try Leaving The Global Internet

Cyber Sovereignty or Virtual Iron Curtain? Russia will test its internal RuNet network to see if the country can function outside the global Internet.

2019-11-04

A £370m Investment To Boost AI In Britain

Big companies, universities and government have combined to invest in artificial intelligence, with a focus on researching applications in Healthcare.

2019-11-01

Cyber Security Training That Employees Don’t Hate

Most employees hate taking cyber security awareness training but it doesn’t have to be that way. There are several ways to help them love it.

2019-11-01

Cyber Training For Every US Federal Employee

One US politician wants every federal employee to know how to securely interact with technology, including Internet-connected devices.

2019-11-01

GDPR Lessons Learned

Uncertainty and contradictions have defined the first year of General Data Protection Regulation (GDPR) enforcement. By Simon Fogg

2019-11-01

Cyber Intelligence & Business Strategy

The planet’s interconnected population will grow from 3.7 to 5 billion over the next 10 years and this has profound consequences for business.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DataCore Software

DataCore Software

DataCore Software is a leader in Software-Defined Storage. Solutions offered include back up and disaster recovery.

Panaseer

Panaseer

Panaseer is an enterprise cybersecurity automation and data analytics company that helps organizations stop preventable breaches by ensuring security controls are working effectively.

AFCERT

AFCERT

AFCERT is the national Computer Emergency Response Team for Afghanistan.

Airbus Cybersecurity

Airbus Cybersecurity

Airbus CyberSecurity is a European specialist in cyber security. Our mission is to protect governments, military and critical national infrastructure enterprises from cyber threats.

ComTrue Technologies

ComTrue Technologies

ComTrue Technologies provides artificial intelligence solutions and information security solutions.

Preempt Security

Preempt Security

The Preempt Platform delivers adaptive threat prevention that continuously preempts threats based on identity, behavior and risk.

Sift

Sift

The Sift Digital Trust Platform protects your business and customers from all vectors of fraud and abuse through our Live Machine Learning, global trust network and automation technologies.

Blockchain Slovakia

Blockchain Slovakia

Blockchain Slovakia is a non-profit organization that brings together researchers, developers, entrepreneurs, regulators, investors and the public to support blockchain technology in Slovakia.

Ergon Informatik

Ergon Informatik

Ergon Informatik AG is Switzerland's leading provider of customised software solutions and software products including fraud detection and the Airlock web security suite.

ngCERT

ngCERT

ngCERT is the National Computer Emergency Response Team for Nigeria.

ReFoMa

ReFoMa

ReFoMa is a consultancy and advisory company with a focus on information Security.

SHIELD

SHIELD

SHIELD is an established end-to-end fraud management solution that blocks fraudulent activities such as account takeovers, fake accounts creation, fraudulent payments, loyalty fraud and more.

Aurora Systems Consulting

Aurora Systems Consulting

Aurora is a Cybersecurity solutions provider with a portfolio consisting of security consulting, products and services that proactively prevent, secure and manage advanced threats and malware.

NTT Group

NTT Group

NTT offers agile, scalable technology services to bring it all together seamlessly, securely, and sustainably. We help you adopt a holistic security approach across your network, clouds, applications.

ThreatFabric

ThreatFabric

ThreatFabric integrates industry-leading threat intel, behavioral analytics, advanced device fingerprinting and over 10.000 adaptive fraud indicators.

Chestnut Hill Technologies (CHT)

Chestnut Hill Technologies (CHT)

CHT provide Best Practices IT Cybersecurity and Technology Solutions and Consulting Support to the Mid Cap through Fortune 1000 Nationwide.