News

2018-08-20

Hackers Can Buy Tools To Attack Your Business For $40

An analysis of 25 DarkWeb sites examined the costs to buy cybercrime tools & services to carry out both simple and more complex attacks.

2018-08-20

Malware – The Hateful Eight

Thesaurus Part 2: This concise malware bestiary will help you get your malware terms right when you hang out with the experts.

2018-08-17

Blackmail Emails Demand Bitcoin Payment

The sender threatens that if you do not pay $1000 in Bitcoin within one day then compromising video will be sent to all of your contacts.

2018-08-17

Internet of Things For Healthcare

Healthcare providers and device makers are all looking to the IoT to revolutionise the gathering of healthcare data and the delivery of care itself.

2018-08-16

Hacking Your Holiday: Cyber Criminals Target Tourism

Last year there were 3.9 billion malicious login attempts on sites belonging to airlines, cruise lines, hotels, travel, car rental & transport organisations.

2018-08-16

GMail Users Warned Of Vulnerability

Confidential Mode: GMail users have been alerted about a new Google Mail feature which can be exploited to carry out a wave of scams.

2018-08-15

Cybersecurity In Self-Driving Cars

There are a broad range of cybersecurity challenges that must be overcome before autonomous and connected vehicles can be widely adopted.

2018-08-15

Law Firms Are Uneducated & Exposed

Law firms often spend far less on cyber insurance than they need to have adequate protection, placing themselves at serious consequential risk.

2018-08-14

Bots & Ballots Make A Sophisticated Threat

Russian efforts to undermine the Democratic 2016 Presidential Campaign appear to have been more complex and extensive than first thought.

2018-07-31

COSCO Cyber Attack And The Importance Of Maritime Cybersecurity

COSCO shipping has been at the receiving end of a cyber attack that saw its operations being hit across the world.

2018-07-30

Facebook Loses $123 Billion In Value

It seems the social media giant's previously inexorable market growth and its euphoric market valuation are both at the point of stalling.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ASIS International

ASIS International

ASIS International is a global community of security practitioners with a role in the protection of assets - people, property, and/or information.

National Crime Agency (NCA)

National Crime Agency (NCA)

The NCA's Cyber Crime Unit focuses on critical cyber incidents in the UK as well as longer-term activity against the criminals and the services on which they depend.

Lepide

Lepide

LepideAuditor is a powerful Data Security Platform that enables you to reduce risk, prevent data breaches and prove regulatory compliance.

Zighra

Zighra

Zighra is a leading provider of On-Device AI solutions for continuous authentication and fraud detection on mobile and web applications.

National Initiative for Cybersecurity Education (NICE)

National Initiative for Cybersecurity Education (NICE)

NICE is a partnership between government, academia, and the private sector focused on cybersecurity education, training, and workforce development.

ST Engineering

ST Engineering

ST Engineering is a leading provider of trusted and innovative cybersecurity solutions.

EU Joint Research Centre

EU Joint Research Centre

JRC is the European Commission's science and knowledge service which employs scientists to carry out research in order to provide independent scientific advice and support to EU policy.

Intrinsyc Technologies

Intrinsyc Technologies

Intrinsyc provides product development services and Edge Computing modules that are helping to take the Internet of Things products to the next level.

Sonrai Security

Sonrai Security

Sonrai Security delivers an enterprise security platform focused on identity and data protection inside AWS, Azure, and Google Cloud.

689cloud

689cloud

689Cloud is a cloud content collaboration platform that allows users to protect, track, and control files AFTER they have been shared.

CYRISMA

CYRISMA

CYRISMA is a revolutionary cybersecurity platform that helps organizations manage risk without the usual headaches associated with enterprise cybersecurity tools.

X Technologies

X Technologies

X Technologies provide world-class engineering, information technology, information security, program management and repair services to Federal, State and commercial customers.

InfusionPoints

InfusionPoints

InfusionPoints is your independent trusted partner dedicated to assisting you in building your secure and compliant business solutions.

Kaesim Cybersecurity

Kaesim Cybersecurity

Kaesim are a global team of cybersecurity experts protecting businesses since 2015. We stop bad people damaging your business, your data and your reputation.

SecZone

SecZone

SecZone is a Chinese enterprise with a mission to "Make It Secure." We are dedicated to driving software security innovation globally.

INT3L

INT3L

The INT3L group (formerly Defentek) is a provider of national security and intelligence solutions, systems and services.