News

2018-08-28

Nobody Is Talking About The  Age of Cyberwar

There is little debate about using cyber weapons, perhaps because these weapons remain invisible, the attacks deniable and the results uncertain.

2018-08-28

Blockchain Enables Anarchy

As soon as you distribute information on multiple servers, some of which are under other people’s control, you lose a measure of control.

2018-08-24

Facebook & Instagram Now Show How Long You Use Them

Giving users a raw count of the minutes they’ve spent in their apps plus their average usage is a good start to making users more mindful.

2018-08-23

Cyber Audits Can Save Businesses $1.5m

IBM say that systematic monitoring, logging, and auditing procedures can cut the average cost of each security breach by more than $1 million.

2018-08-24

The Market For Cybercrime Tools Is Thriving

A Dark Web survey shows cyber criminals no longer need deep technical knowledge - any type of attack is now feasible given sufficient funding.

2018-08-03

Germany Wants A Legal Framework For Cyberwar

In response to domestic intelligence reports of surging nation-state attacks against it, Germany wants to actively respond to acts of cyberwar.

2018-08-23

An Election Interference Alert System

An early warning system being developed to spot attempts to subvert elections by searching out fake news & propaganda would be easily thwarted.

2018-08-22

Blockchain In Plain English

What is Blockchain really all about? In an attempt to make this definition as simple as possible, Blockchain automates trust.

2018-08-22

Cybersecurity Jumps Up The Corporate Agenda

Security experts are more worried about data breaches than ever, with most fearing Meltdown-Spectre type attacks will become the new normal.

2018-08-21

Phishing Tools Used To Attack The Power Grid

Russian hackers penetrated hundreds of US utilities, manufacturing plants gained access by using the most conventional of phishing tools.

2018-08-21

The Impact Of Economic Espionage

An official US Government report highlights current threats and future trends in foreign intelligence efforts to steal trade secrets.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DocAuthority

DocAuthority

DocAuthority automatically discovers and accurately identifies unprotected, sensitive documents, enabling a broad yet business-friendly security policy.

Fingerprint Cards

Fingerprint Cards

Fingerprint Cards develops and produces biometric components and technologies that verify a person’s identity through the analysis and matching of an individual’s unique fingerprint.

Pareteum

Pareteum

Pareteum is a leading Global provider of mobile networking software and services. Our mission is to provide a single solution to the problem of fully enabling and securing the Mobile Cloud.

Sompo International

Sompo International

Sompo International is a global specialty provider of property and casualty insurance and reinsurance services including Cyber & Network Risk.

Ockam

Ockam

Ockam gives you the tools you need to establish an architecture for trust within your connected device applications.

C11 Cyber Security & Digital Innovation Centre

C11 Cyber Security & Digital Innovation Centre

C11 is working with local and national partners to develop talent and bring brilliant minds and brilliant businesses together.

Censys

Censys

Our customers rely on Censys data to get the global visibility they need of their attack surfaces in order to proactively prevent nation-state attacks and emerging threats.

Duality Technologies

Duality Technologies

Duality Technologies combine Advanced Cryptography with Data Science to deliver High-Performance Privacy-Protecting Computing to Regulated Industries.

DNX Ventures

DNX Ventures

Based in Silicon Valley and Tokyo, DNX Ventures is an early stage VC for B2B startups in sectors including Cybersecurity.

Viria

Viria

Viria is an information and security technology solution provider that promotes digitalization in a secure way.

AdaCore

AdaCore

AdaCore is focused on helping developers build safe, secure and reliable software.

Buchanan & Edwards

Buchanan & Edwards

Buchanan & Edwards delivers forward-focused technology solutions that help our clients transform the way they perform their missions.

Kompleye

Kompleye

Kompleye is a recognized cybersecurity and compliance audit organization that offer a comprehensive solution for different industries.

Zigrin Security

Zigrin Security

Zigrin Security offer comprehensive, hands-on security testing of internal networks, applications, cloud-based solutions, e-commerce applications and mobile devices.

Telindus

Telindus

Telindus is the strategic IT partner for the flexible organization of the future. We build optimal IT infrastructure with four components: networking, cloud, cybersecurity and data & AI.

Plerion

Plerion

Plerion is an all-in-one Cloud Security Platform that supports workloads across AWS, Azure, and GCP delivering cloud security posture management, workload security, data security and more.