News

2019-05-17

G7 To Simulate Cross-Border Cyber Attack

Leading Western industrial powers will for the first time jointly simulate a major cross-border cybersecurity attack on the financial sector.

2019-05-15

Cyber-Attacks On Maritime Oil Tankers

Four oil tankers and a pipeline attacked near the Strait of Hormuz, using a combination of armed drones and GPS spoofing navigation software.

2019-05-15

Britain To Initiate Online “Porn Ban’

The UK government intends to implement a “Porn Ban” nationwide on July 15, restricting access to online pornography for under 18s. But will it work?

2019-05-14

WhatsApp Penetrated By Spyware

Hackers have installed surveillance software on phones and other appliances exploiting a major weakness in Facebook’s WhatsApp messenger.

2019-05-14

Fake News Ahead Of EU Elections

The EU is experiencing a surge in information warfare in an attempt to sway the outcome of elections later this month.

2019-05-17

What's Your Data Strategy?

All businesses need a Data Strategy which encompasses audits, reviews their security, data protection & employee cyber awareness training.

2019-05-22

Hackers Don't Only Target Big Business

Specialist Insurers Hiscox find that hackers are shifting focus from larger companies and that SMEs are now equally vulnerable.

2019-05-22

Verizon 2019 Data Breach Report

No matter what defensive security measures are put in place, attackers can get through. Verizon's latest Data Breach Report confirms the problem.

2019-05-17

‘Chinese Spies’ Had NSA Cyber Weapons Before The Shadow Brokers Leak

Chinese spies obtained NSA cyber weapons more than a year before they were leaked in one of the most high-profile hacks of the last decade.

2019-05-16

AI In Cyber Security Is Worth Almost $5B

The surge of cyber attacks is one of the prime growth factors behind the AI-driven cyber security market, currently valued at $4.94B.

2019-05-21

Young Hacker Makes $1m. Legally.

It Pays To Be Ethical: A 19-year-old Argentinian has made history as the first to earn over $1,000,000 in bug bounty awards.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Agenci

Agenci

Agenci are specialists in cyber security and information security and deliver ISO 27001 Certification.

Kenexis

Kenexis

Kenexis is a consulting engineering firm providing services for process hazards analysis, fire and gas mapping, and industrial cybersecurity.

Namogoo

Namogoo

Namogoo’s disruptive technology identifies and blocks unauthorized product ads that are injected into customer web sessions by client-side Digital Malware.

Nexus Group

Nexus Group

Nexus Group develops identity solutions for physical and digital access.

Vysk Communications

Vysk Communications

Vysk is an award-winning mobile security firm that has developed the world’s most secure system for voice communication.

Wüpper Management Consulting (WMC)

Wüpper Management Consulting (WMC)

Specialized in compliance, risk management and holistic information security WMC GmbH has longtime implementation experience in global projects.

Farsight Security

Farsight Security

Farsight Security provides the world’s largest real-time actionable threat intelligence on how the Internet is changing.

Razorpoint Cybersecurity

Razorpoint Cybersecurity

Razorpoint’s world-class security experts have provided advanced, effective cybersecurity expertise to corporate and public-sector organizations around the world.

Buchanan & Edwards

Buchanan & Edwards

Buchanan & Edwards delivers forward-focused technology solutions that help our clients transform the way they perform their missions.

Ethiopian Cybersecurity Association (ECySA)

Ethiopian Cybersecurity Association (ECySA)

ECySA was formed to play an influential part in the ongoing and dawning cybersecurity practices of Ethiopia, efficiently creating public and private awareness on all kinds of cyber risks and threats.

TheHive Project

TheHive Project

TheHive Project is a Scalable, Open Source and Free Security Incident Response Platform for SOC, CSIRT and CERT teams.

Maintel

Maintel

Maintel provides cloud and managed communications services. We help our customers to deliver exceptional customer experiences, and to securely access their applications and their data.

Security Compliance Associates (SCA)

Security Compliance Associates (SCA)

The sole focus of SCA is safeguarding critical information and complying with information security regulations.

Redcoat AI

Redcoat AI

Redcoat AI provide a comprehensive security platform that continuously evolves with the threats and opportunities presented by AI.

Evolve Business Group

Evolve Business Group

Evolve is an independently-owned managed network solutions provider, creating bespoke packages for customers globally since 2005.

Precision Cybertechnologies & Digital Solutions (Precision-Cyber)

Precision Cybertechnologies & Digital Solutions (Precision-Cyber)

Precision-Cyber was founded on the philosophy of state-of-the-art cybersecurity and digital solutions. Our guiding principle is simply that we will provide and secure all your digital needs.