News

2018-09-17

Iranian Hackers Target Universities For Secret Research

Iranian hackers target academic institutions as part of a major campaign to steal unpublished research and obtain intellectual property.

2018-09-14

Cybersecurity Needs A Collective Approach

The boom in cybercrime means it is no longer a problem reserved for the IT department - everyone must work together to tackle the threat.

2018-09-14

How Hackers Skipped Through BA’s Security

Researchers from the threat detection firm RiskIQ shed new light on how attackers pulled off the theft of 380,000 customer transaction records from BA.

2018-09-14

GCHQ Data Collection Violated Rights To Privacy

GCHQ’s methods of bulk interception of online communications violated privacy rules and failed to provide sufficient surveillance safeguards.

2018-09-17

Enterprise Blockchain Struggles To Carve Out A Niche

Blockchain enthusiasts refuse to believe it, but the long-term opportunity for its adoption falls short of the revolutionary disruption they hope for.

2018-09-17

Cyber Criminals Are Outspending Business

The cybercrime community spends over $1tn each year developing attacks, compared with the $96bn spent by organisations on security from attacks.

2018-09-17

Embracing The AI Robot Revolution

Relax. Robotics expert Prof. Noel Sharkey says robotics is about convenience and customers service, not an existential threat.

2018-09-14

The Rise of AI Driven DDoS Attacks

The new era of AI driven DDoS will have the power of IoT-based attacks, plus powerful feedback loops & automatic optimisations.

2018-09-13

Will Russian Hackers Affect this Year's US Election?

Once again, hackers on the outside of the American political system were probing for a way in to exert a malign influence on elections.

2018-09-13

Britain Plots Cyber Revenge On Russia For Novichok Poisonings

Britain and its allies promise revenge on Vladimir Putin’s regime for the Novichok attack believed to be carried out by Russian secret agents.

2018-09-13

The 'Deep Web' May Be x 500 Bigger Than The ‘Normal Web’

The deep web can be accessed only with specific software and it is estimated to be about 400 to 500 times larger than the common Internet.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IABG

IABG

Activities include consulting services in the development of software systems in the area of secure information and data communication.

CUIng.org

CUIng.org

The CUIng initiative was launched to tackle the problem of criminal exploitation of information hiding techniques.

Industrial Networking Solutions (INS)

Industrial Networking Solutions (INS)

INS Services specializes in designing, deploying and providing on-going support for critical OT (Operational Technology) and IIoT (Industrial Internet of Things) networks.

Cybersecurity Competence Center (C3)

Cybersecurity Competence Center (C3)

The Cybersecurity Competence Center was created to further strengthen the Luxembourg economy in the field of cybersecurity.

Bridewell

Bridewell

Bridewell provide cost effective Security & Risk Assurance Services across Information Security, Cyber Security, Technology Risk, Security Testing and Data Privacy.

SCADASUDO

SCADASUDO

SCADASUDO is a cyber solution architecture and design office, established by leading experts in the field of OT (Industrial control) and IT (information Technology).

Mosaic 451

Mosaic 451

Mosaic451 is a bespoke IT managed services provider and consultancy specializing in information security, operations and design.

Specops Software

Specops Software

Specops Software is a leading password management and authentication solution vendor.

Kratos Defense & Security Solutions

Kratos Defense & Security Solutions

The Kratos Space, Training, and Cybersecurity division addresses key cybersecurity challenges, including cloud security, continuous monitoring, IT security, and risk management.

CyberNews

CyberNews

Cybernews.com is a research-based online publication that helps people navigate a safe path through their increasingly complex digital lives.

Xopero Software

Xopero Software

Xopero Software develops a comprehensive range of professional tools for protecting and restoring critical business data.

ST Engineering Antycip

ST Engineering Antycip

ST Engineering Antycip (formerly Antycip Simulation) is Europe’s leading provider of professional grade COTS simulation software, projection & display systems, and related engineering services.

Vaultinum

Vaultinum

Vaultinum are a trusted independent third party specialized in the protection and audit of digital assets.

Custodia Continuity

Custodia Continuity

Custodia Continuity manage your Security, Backup, Continuity and Compliance. You get on with your business.

PCCW Global

PCCW Global

PCCW Global is a leading communications service provider, offering mobility, voice and data solutions to multinational enterprises, telecomms partners, cloud and application service providers.

Troye Computer Systems

Troye Computer Systems

Troye provide a complete range of digital workspace solutions that empower people to do their very best work in a safe and secure manner anywhere, anytime, using any device.