News

2019-09-25

Effective Cybersecurity Requires Both Cyber Training & Insurance Cover

A Belt & Braces Approach: Organisations can't rely an a firewall to keep out criminals. It takes proper training reinforced with good cyber insurance.

2019-09-25

Attack On Ukraine's Power Grid Targeted Transmission Stations

Crash Override: The experts at Dragos have recreated the 2016 attack timeline which knocked out the power supply to Ukraine's capital city.

2019-09-25

5G Needs A New Generation Of Security

5G networks can deliver much more data much faster, dramatically raising the stakes for ensuring the security & reliability of mobile communications.

2019-09-24

Thomas Cook In A Cyber Collapse

The 150,000 holiday-makers stranded by the failure of Thomas Cook are at risk of a wave of online fraud as they make their way home.

2019-09-24

Who’s Afraid Of Huawei?

Understanding the 5G Security Concerns: Can the risks of using the Chinese tech giant's mobile network technology be mitigated?

2019-09-24

Cyber Security Does Not Follow From Cyber Awareness

The Singapore Cyber Security Agency says that its not just a lack of awareness that renders organisations vulnerable, it is also complacency.

2019-09-27

AI Is Changing The Cyber Security Landscape

Artificial Intelligence can be used to detect and prevent attacks before they take place, but it can also be a double-edged sword.

2019-09-23

US Sanctions Against N. Korean Hacking Groups

Three hacking groups stand accused of stealing possibly hundreds of millions of dollars from financial institutions around the world.

2019-09-23

Will Robots Be Allowed To Kill?

The advent of autonomous weapons demands some form of agreed international legal restrictions on their use. By Alfred Rolington

2019-09-23

Business Migration To The Cloud

Making the decision to migrate to the cloud can be daunting. The tools are different and large-scale migration is not something to be taken lightly.

2019-09-20

The Technology Of Human Robotics

Mechanical people, nano-robots and the blurring of human identity are in prospect as the technology of robotics advances. By Alfred Rolington

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Secure Source

Secure Source

Secure Source specialise in search and recruitment for Cyber Security and Security Cleared markets.

MailGuard

MailGuard

MailGuard delivers a full suite of security solutions across email and web to protect your business before threats reach your environment.

SRI International

SRI International

SRI International is a research institute performing client-sponsored R&D in a broad range of study areas including computing and cybersecurity.

Spanish National Cybersecurity Institute (INCIBE)

Spanish National Cybersecurity Institute (INCIBE)

INCIBE undertakes research, service delivery and coordination for building cybersecurity at the national and international levels.

CTR Secure Services

CTR Secure Services

CTR Secure Services provides a broad range of security consulting services from asset protection to cyber security.

Fornetix

Fornetix

Fornetix is a cybersecurity platform enabling Zero Trust while delivering critical encryption automation, access controls, authorization services, machine identity, and ICAM solutions,

Magal Security Systems (Magal S3)

Magal Security Systems (Magal S3)

Magal Security Systems is a leading international provider of integrated solutions and products for physical and cyber security, safety and site management.

Securely

Securely

Securely Ltd. is an IT consulting and services firm specializing in PKI solutions and products.

ADL Consulting

ADL Consulting

ADL Consulting provide information security-related consultancy and training support to businesses across the UK. Our services include ISO27001, GDPR, Cyber Essentials and training.

Telefonica Global Solutions (TGS)

Telefonica Global Solutions (TGS)

Telefonica Global Solutions is the technological partner of wholesalers and enterprises, helping them to achieve the digitalization they need.

Cyber Defence Solutions (CDS)

Cyber Defence Solutions (CDS)

Cyber Defence Solutions is a cyber and privacy Consultancy with extensive experience in the development and implementation of cyber and data security solutions to your assets.

Searchlight Cyber

Searchlight Cyber

Searchlight Cyber is a leading darknet intelligence company. Working with law enforcement, industry, and end users to help protect society against the threats of the darknet.

Red Access

Red Access

Red Access provides the first SaaS-based platform to protect web browsing from cyber threats on any browser and any in-app while ensuring frictionless user experience.

Quantum Security Services

Quantum Security Services

Quantum Security Services is a specialist information security firm providing a range of risk, compliance and technical security services.

63 Moons Technologies (63MT)

63 Moons Technologies (63MT)

63 Moons Technologies is a world leader in providing next-generation technology ventures, innovations, platforms, and solutions.

CyberSecAsia

CyberSecAsia

CyberSecAsia series conference is the one and only decision-makers gathering for CISO and info security experts in Asia.