News

2018-06-28

IBM’s AI Can Argue With Humans

Bringing practical applications to AI technology has proven difficult and IBM's Project Debater shows there is a long way to go.

2018-06-28

How to Measure Cybersecurity Success

When performance is measured, performance improves. When performance is measured and reported, the rate of improvement accelerates.

2018-06-27

13 Ways Cyber Criminals Spread Malware

A search of darknet forums reveals a wide range of techniques used by criminal hackers to spread malware, steal data and plant crypto ransomware.

2018-06-27

A Guide To Addressing Corporate IoT Security

What can enterprises do to strengthen the security of their IoT environments? Here are some suggested best practices from industry experts.

2018-06-28

Former UK Spy Boss Say Russia Is 'live testing' Cyber-Attacks

The problem posed by nation state attackers has increased over the last five years and become an issue for enterprises as well as governments.

2018-06-27

Ukraine Says Russian Hackers Are Preparing A Massive Strike

Hackers from Russia are infecting Ukrainian companies with malicious software to create “back doors” for a large, coordinated attack.

2018-06-26

Chinese Hack Breached US Satellites

Hackers infected computers controlling critical US communications satellites, so that they could change orbital positions and disrupt data traffic.

2018-06-26

German Nuclear Plant Infected With Viruses

The RWE Gundremmingen nuclear plant, located northwest of Munich, has been found to be infected with computer viruses. But don't worry....

2018-06-26

BMW Cars Can He Hacked

Fast Forward: An in-depth analysis of various systems present in BMW cars has discovered 14 locally and remotely exploitable vulnerabilities.

2018-06-25

White Hat To Combat Cyber-Attacks

The Israeli National Cyber Security Authority is sub-contracting protection of critical infrastructure, sector by sector.

2018-06-25

Blockchain v World Cup – It Could Go To Penalties…

TV Adverts promoting Blockchain start-up Hdac are premature and possibly misleading about the current actual capability of the technology.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Centrify

Centrify

Centrify’s Next-Gen Access is an identity & access management solution that uniquely converges Identity-as-a-Service, enterprise mobility management and privileged access management.

Ilex International

Ilex International

Ilex International is a European software vendor which specialises in Identity & Access Management solutions.

National Authority Against Electronic Attacks (NAAEA) - Greece

National Authority Against Electronic Attacks (NAAEA) - Greece

The National Authority Against Electronic Attacks (NAAEA) is the national computer emergency response team of Greece.

VTT Technical Research Centre of Finland

VTT Technical Research Centre of Finland

VTT is the leading research and technology company in the Nordic countries. Areas of activity include cyber security.

BitNinja

BitNinja

BitNinja provides full-stack server security in one easy-to-use protection suite. Enjoy real-time protection, automatic false positive handling and threat analysis for more in-depth insights.

Armexa

Armexa

Armexa is a leading provider of advanced industrial cybersecurity solutions that protect your critical OT and ICS infrastructure against ever-changing threats.

West Midlands Cyber Resilience Centre (WMCRC)

West Midlands Cyber Resilience Centre (WMCRC)

The East Midlands Cyber Resilience Centre supports and helps protect SMEs and supply chain businesses and third sector organisations in the region against cyber crime.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Avetta

Avetta

Avetta One is the industry’s largest Supply Chain Risk Management (SCRM) platform. It enables clients to manage supply chain risks and suppliers to prove the value of their business.

Software Improvement Group (SIG)

Software Improvement Group (SIG)

Software Improvement Group helps business and technology leaders drive their organizational objectives by fundamentally improving the health and security of their software applications.

Numen Cyber Technology

Numen Cyber Technology

Numen Cyber Technology is committed to becoming a Threat Discovery and Response expert for corporate customers.

Cynical Technology

Cynical Technology

Cynical Technology is a Nepalese cybersecurity company with expertise in security consulting, auditing, testing and compliance.

Summit 7 (S7)

Summit 7 (S7)

Summit 7 is a national leader in cybersecurity, compliance, and managed services for the Aerospace and Defense industry and corporate enterprises.

Evo Security

Evo Security

Evo Security is an Identity and Access Management company focused exclusively on serving MSPs, MSSPs and their SMB and Mid-Market customers.

Frontal

Frontal

Frontal is a specialized unit in Blockchain and Web3.0 cybersecurity. Securing Digital Assets, Cryptocurrency, DeFi, Blockchain and Web3.0 ecosystem.

Career Smarter

Career Smarter

Career Smarter offers accredited online courses in cybersecurity and other sectors, helping learners gain industry-recognised certifications.

Lupasafe

Lupasafe

Lupasafe is a software for businesses to see IT risks and insights, and provide vital training for employees.