News

2018-06-25

Blockchain v World Cup – It Could Go To Penalties…

TV Adverts promoting Blockchain start-up Hdac are premature and possibly misleading about the current actual capability of the technology.

2018-06-25

China’s Electronic Surveillance Program Targets Muslims

China has created one of the world’s most sophisticated state surveillance systems to target the predominantly Muslim Uighur ethnic minority.

2018-06-25

Police Advice On Cybercrime & Online Safety

Basic precautions: One of Britain's largest police forces is giving practical advice to prevent online users falling victim to cybercrime.

2018-06-25

US Accuses Russia Of Interfering With Undersea Cables

The US Government says the FSB are engaged in deep-sea espionage to intercept and tap underwater telecommunications cables.

2018-06-25

Using Machine Learning To Spot Photoshopped Images

Adobe is using machine learning to make it easier to spot Photoshopped images. New research uses AI to automate traditional digital forensics.

2018-06-26

White House Reorganisation Addresses Cyber Workforce Gap

The White House wants to build a single, unified strategy for strengthening the cybersecurity workforce at every agency across government.

2018-06-22

Cybrary and Cybersecurity Collaborative Form New Strategic Partnership

CISOs gain access to leading online cybersecurity and IT career development platform to increase the skills of their internal IT professionals.

2018-06-22

Cyber Criminals Love The UK

Britain is considered the top target for cyber criminals in Europe. They like coming to London to launder their stolen money, too.

2018-06-22

AI Is Re-Inventing IT

Artificial Intelligence is taking over the IT world, as companies use AI and machine learning to improve tech support & manage infrastructure.

2018-06-22

Its About Training, Stupid.

Both private & public sectors In S. Africa need to train their employees, the weak point in any organisation's defences, to counter cyber threats.

2018-06-22

The Pentagon's AI Program To Find Hidden Nuclear Missiles

The US military is increasing spending on a secret research effort to use Artificial Intelligence to help anticipate the launch of a nuclear-capable missile.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIT Internet Policy Research Initiative (IPRI)

MIT Internet Policy Research Initiative (IPRI)

IPRI's mission is to work with policy makers and technologists to increase the trustworthiness and effectiveness of interconnected digital systems

Korea Information Security Industry Association (KISIA)

Korea Information Security Industry Association (KISIA)

KISIA is a non-profit organization for the information security industry in Korea.

netfiles

netfiles

netfiles offers highly secure data rooms for sensitive business processes and secure data exchange.

Datec PNG

Datec PNG

Datec is the the largest end-to-end information and communications technology solutions and services provider in Papua New Guinea.

Prescient

Prescient

Prescient’s Cyber solutions supplement your firm’s existing data security infrastructure with specialized investigations that identify unconventional cyber risks.

Proton Data Security

Proton Data Security

Proton Data Security is a certified small business specializing in the design, manufacturing and sales of data security products for permanent erasure of hard drives, tapes and optical media.

CYBRScore

CYBRScore

CYBRScore is a premium, performance-based cyber skills training and assessment provider that quantifies a user’s ability to defend a network.

BitTrap

BitTrap

BitTrap helps companies worldwide detect attackers and put an early end to breaches, preventing data exfiltration and ransomware altogether.

Terra Quantum

Terra Quantum

Terra Quantum is a deep tech pioneer, developing revolutionary quantum applications to shape the technology of the future.

Digital Silence

Digital Silence

Digital Silence is a world-class provider of information security research and consulting services.

Flexxon

Flexxon

Flexxon is the industry leader to develop NAND flash storage devices. Our key focus is to innovate memory devices ensuring data security and reliability.

Information Security Officers Group (ISOG)

Information Security Officers Group (ISOG)

ISOG's mission is to strengthen information security through awareness and education programs, promoting community and fellowship among information security leaders.

KYND

KYND

KYND has created pioneering cyber risk technology that makes assessing, understanding, and managing business cyber risks easier and quicker than ever before.

Armolon

Armolon

Armolon provides comprehensive data breach and cybersecurity, as well cybersecurity audits and certifications, and disaster recovery/business continuity services to clients.

Sycope

Sycope

Sycope is focused on designing and developing highly specialised IT solutions for monitoring and improving network and application performance.

CODA Intelligence

CODA Intelligence

CODA's AI-powered attack surface management platform helps you sort out the important remediations needed in order to avoid exploits on your systems.