News

2018-08-02

Five Key Ways to Protect Your Company Against Cyber Attacks

The steps to achieving business security include the use of up-to-date data encryption, data back-up, firewalls, anti-malware software and insurance.

2018-07-25

Singapore’s Giant Healthcare Hack

Hackers attacked the computers of SingHealth, the Republic's largest public healthcare group and scooped up personal information on 1.5m patients.

2018-08-02

MoneyTaker Take Money From A Russian Bank

The MoneyTaker group are hard to track because they use common OS utilities to perform malicious actions, instead of relying on actual malware.

2018-07-25

Trump / Putin Summit Was A Magnet For Hackers

The Helsinki meeting between Presidents Trump and Putin was as big a magnet for hackers as the Singapore summit with Kim Jong-un.

2018-08-02

What A ‘Cyber 9/11’ Would Look Like

Experts think national cyber vulnerabilities stem in large part from a lack of qualified people capable of defending companies and governments.

2018-07-24

Fraudsters £350k Spoof University Emails

Action Fraud issue a warning as reports show that fraudsters are registering domain names to look like they belong to UK university email addresses.

2018-07-24

Mitigating IoT Cyber Risks: Training Is The First Step

It is vital to educate everyone in the risks involved with adopting increased IoT connectivity and how it can be mitigated.

2018-07-23

Darktrace - From Cybersecurity Start-Up To Unicorn

Darktrace has been named Europe's most promising tech company with a $1.25 billion valuation and contracts secured worth $400m.

2018-07-23

No More Asylum For Julian Assange

Ecuador is planning to withdraw its political asylum for Assange, eject him from its London embassy & might turn him over to the British authorities.

2018-07-21

Trump Blames Obama For Russian Cyber-Attack

US President Donald Trump has blamed Barack Obama for failing to prevent Russia’s 2016 cyber-attack on democratic email servers.

2018-07-23

NZ Cyber Security Challenge Simulates Drone Attacks

Around 400 aspiring cybercrime fighters in New Zealand will attempt to infiltrate a horde of killer drones, manufactured by a criminal group.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Netskope

Netskope

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data.

Australian Signals Directorate (ASD)

Australian Signals Directorate (ASD)

The Australian Signals Directorate is an intelligence agency in the Australian Government Department of Defence.

Insta Group

Insta Group

Insta are a trusted cyber security partner for security-critical companies and organizations.

GuardKnox

GuardKnox

GuardKnox protects the users of connected vehicles against threats that can endanger their physical safety and the safety of their personal information.

Air Informatics

Air Informatics

Air Informatics LLC provides security, information management, analytics and informatics for IT and wirelessly enabled airplanes and operations.

Secure Code Warrior

Secure Code Warrior

Secure your code from the start with gamified, scalable online secure coding training for software developers.

Crayonic

Crayonic

Crayonic digital identity technologies protect and guarantee the identity of people and things.

Turkish Accreditation Agency (TURKAK)

Turkish Accreditation Agency (TURKAK)

TURKAK is the national accreditation body for Turkey. The directory of members provides details of organisations offering certification services for ISO 27001.

Onward Security

Onward Security

Onward Security provides security solutions including network & application assessment, product security testing and security consulting services.

Foundries.io

Foundries.io

Foundries.io have built a secure, open source platform for the world's connected devices, and a cloud service to configure this to any hardware and any cloud.

BT Security

BT Security

BT provides telecommunications and network infrastructure services to keep businesses around the world connected and secure.

NAK Consulting Services

NAK Consulting Services

NAK is helping organisations to create Secure, Agile IT Environments. Our goal is to be the trusted advisor and managed service partner for our clients.

vpnMentor

vpnMentor

We started vpnMentor to offer users a really honest, committed and helpful tool when navigating VPNs and web privacy.

SecureAck

SecureAck

From our A-Op SaaS automation platform to Managed Automation-as-a-Service (MAaaS), SecureAck offer powerful security automation the way that best suits your organisation's needs.

Nothreat

Nothreat

Nothreat has revolutionized how businesses like yours protect themselves from damaging cyber attacks. Our tech learns and adapts in real time, protecting clients from even zero-day attacks.

Quantum Bridge

Quantum Bridge

Our unbreakable key distribution technology ensures the highest level of protection for your critical infrastructure and sensitive data in an evolving digital landscape.