News

2019-10-01

The WannaCry Hangover

WannaCry detections are at an all-time high and it continues to infect computers worldwide, say the security experts at Sophos.

2019-10-01

Cyber Security Experts Needed in Australia

As organisations around the build their defences against cyber threats, the demand for cyber experts in Australia has dramatically increased.

2019-12-16

IT Governance - FREE Guide

IT Governance | Download the FREE guide: Information Security & ISO 27001 – An Introduction

2019-10-01

N. Korean Hackers Attacking Cash Machines In India

DTrack: Hackers with ties to North Korea have developed a new malware variation to steal data from cards inserted into ATM machines in India.

2019-09-30

Iran Denies It Has Suffered Attacks On Its Oil Production

Iran has denied that its oil infrastructure had been successfully attacked by a cyber operation, following reports of disruptions to the sector.

2019-09-30

Top 5 Rules For Laying Out An Employee Cybersecurity Policy

Five tips to help you to develop an employee cybersecurity policy that helps your people to learn how to defend themselves. By Aimee Laurence.

2019-10-02

WEBINAR: How to perform a security investigation in AWS

Tuesday October 22 | Join SANS and AWS Marketplace for guidance on conducting efective investigations in your AWS environment.

2019-09-30

Rogue States Are Funding Stateless Hackers

Retired NSA Chief says cyber-attacks are more likely to come from criminals funded by US enemies than from the enemies themselves.

2019-09-30

Organised Social Media Manipulation

The use of computational propaganda to shape public attitudes via social media has become main-stream, far beyond the actions of a few bad actors.

2019-09-28

Huawei Will Sell Its 5G Know-How

Huawei wants to address the widespread concerns over the integrity of its 5G network technology by licensing it to EU and US competitors.

2019-09-26

Old Magecart Domains Come Back To Life

A consortium of malicious hacker groups who target online shopping cart systems known as Magecart are repurposing some old tools.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

RedTeam Security

RedTeam Security

RedTeam Security is a provider of Penetration Testing, Social Engineering, Red Teaming and Red Team Training services.

European Council on Foreign Relations (ECFR)

European Council on Foreign Relations (ECFR)

ECFR is a pan-European think-tank conducting research and promote informed debate on European foreign policy. Cyber security is becoming an intrinsic element of foreign policy debate.

Hiscox

Hiscox

Hiscox offers cyber and data risks insurance to protect your business against the risks of holding data and using computer systems..

Device Authority

Device Authority

Device Authority specialises in security automation for the Internet of Things (IoT).

BSA - The Software Alliance

BSA - The Software Alliance

BSA is the leading advocate for the global software industry before governments and in the international marketplace.

Emerson Electric Co

Emerson Electric Co

Emerson provides industrial automation systems and associated cybersecurity solutions to protect critical process control systems from cyber attack.

Cyber Exchange

Cyber Exchange

Cyber Exchange provides a focal point for UK organisations connected with, or with an interest in, cyber security to connect, engage and collaborate.

Ergon Informatik

Ergon Informatik

Ergon Informatik AG is Switzerland's leading provider of customised software solutions and software products including fraud detection and the Airlock web security suite.

The Legal 500

The Legal 500

The Legal 500 Hall of Fame highlights, to clients, the law firm partners who are at the pinnacle of the profession. Practice areas covered include Data Protection, Privacy and Cybersecurity.

MagiQ Technologies

MagiQ Technologies

MagiQ produced the world’s first commercial quantum cryptography product that delivered advanced, future-proof network security.

Software Diversified Services (SDS)

Software Diversified Services (SDS)

SDS provides the highest quality mainframe software and award-winning, expert service with an emphasis on security, encryption, monitoring, and data compression.

WhiteHawk

WhiteHawk

WhiteHawk is the first online Cyber Security Exchange. We help you understand your cyber risk and match you to tailored and affordable solutions.

SecureAge Technology

SecureAge Technology

We’re a rapidly growing cybersecurity company with an 18-year history of ZERO Data breaches. Our security solutions place security and usability on equal footing. Learn more about our technology.

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries is America’s largest military shipbuilding company and a provider of professional services to partners in government and industry.

Ekco

Ekco

Ekco is one of Europe’s leading managed cloud providers. With a network of infrastructure and security specialists across Europe, we’ve perfected our approach to supporting digital transformation.

Loccus AI

Loccus AI

Loccus are developers of AI solutions in the voice safety space. We build identity verification solutions, deepfake detection systems and fraud protection products for companies and end-users.

Gathid

Gathid

Gathid is a unique and versatile identity governance platform providing organizations with the ability to model, explore, audit, and track complex access-related scenarios.