News

2018-06-15

NCSC Investigate Giant Dixons Data Breach

The NCSC is working alongside the retailer to detect the hackers who took 5.9 million payment card details and 1.2 million personal data records.

2018-06-18

Cyber Security Intelligence Website Upgrade

The design and function of this website has been upgraded to make information more easily accessible to users.

2018-06-15

Bill Clinton Has Written A Cyber-Thriller

Former US President Bill Clinton has co-authored a novel about a commander-in-chief going undercover to prevent a catastrophic cyber attack.

2018-06-14

New Website Design & Function.

More articles on the homepage, Service Provider listings on every page and breaking news on the @CyberSecInt ticker at the top of each page.

2018-06-15

Deaths From Cyber Attacks

Attacks that cause physical harm to systems that involve critical infrastructure are an emerging challenge and the consequences could be fatal.

2018-06-14

GDPR Isn’t Enough Protection In An Age Of Smart Algorithms

GDPR protects personal information, but what about the highly valuable inferred data produced by algorithms and used by advertisers?

2018-06-14

Chinese Hackers Steal Naval Warfare Secrets

A contractor using an unsecured network was the entry point for Chinese hackers to steal top secret data about the US Navy's submarine missiles.

2018-06-13

America Can Learn About Russian Disinformation From Europe

The information warfare tactics used in Ukraine, Estonia and elsewhere in Europe are easily replicable in the next US midterm elections.

2018-06-13

Cybercrime: Under-Reporting Gives Hackers A Green Light

The lack of successful cybercrime reporting in the UK means that cyber attackers believe there are no consequences of their actions.

2018-06-13

Google Workers Are Revolting

Thousands of Google employees have signed an open letter asking the Internet giant to stop working on a project for the US military.

2018-06-13

F-35 Is The Most Thoroughly Tested Cyber Weapon

Debugging: With almost 9m lines of software code the new warplane has been described as essentially a flying computer.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

SOTI

SOTI

SOTI is an industry leader in Enterprise Mobility Management (EMM).

Operational Center for Information Systems Security (COSSI)

Operational Center for Information Systems Security (COSSI)

COSSI is responsible for the detection and mitigation of cyber attacks directed at French Government information systems.

Accertify

Accertify

Accertify is a leading provider of fraud prevention, chargeback management, and payment gateway solutions.

Hallam-ICS

Hallam-ICS

Hallam-ICS designs MEP systems for facilities and plants, control and automation solutions, and ensures safety and regulatory compliance.

CyberSaint Security

CyberSaint Security

CyberSaint’s CyberStrong Platform empowers organizations to implement automated, intelligent cybersecurity compliance and risk management.

Technology Ireland ICT Skillnet

Technology Ireland ICT Skillnet

Technology Ireland ICT Skillnet is a network of companies who collaborate to address skills needs within the technology sector.

Nucleon Security

Nucleon Security

Nucleon Endpoint Detection and Response EDR is the most effective way to protect the value created by your organization against any threat.

SecureData

SecureData

SecureData provide professional data recovery services, digital forensics, data recovery software and FIPS 140-2 Level 3 Validated hardware encrypted drives.

META-Cyber

META-Cyber

META-cyber was founded by engineers with experience in process and control-protection to provide cyber security for industrial infrastructure.

Oivan

Oivan

Oivan harnesses the strengths of the web, mobile, cloud, cybersecurity, and blockchain technologies to help our clients to launch transformative digital services.

Northdoor

Northdoor

Northdoor provides a comprehensive set of services around information security and works with leading global technology vendors to deploy and manage cyber security solutions.

Siren

Siren

Siren provides the leading Investigative Intelligence Platform to some of the world’s leading Law Enforcement, National Security and Cyber threat investigators.

Bit Sentinel

Bit Sentinel

Bit Sentinel is an information security company. We help companies like yours discover, prioritize, and effectively remediate potential cybersecurity risks.

Sentar

Sentar

Sentar is a cyber intelligence company, applying advanced analytics and systems engineering expertise to protect our national security by securing mission-critical assets.

Verastel

Verastel

Specializing in the niche space of proactive cyber-defense, and adaptive resilience, team Verastel is bolstering enterprise digital security like never before.

Orca Fraud

Orca Fraud

Orca is an AI-driven fraud orchestration platform. We empower fraud fighters to outpace fraud using our custom ML models.