News

2018-06-18

Cyber Security Intelligence Website Upgrade

The design and function of this website has been upgraded to make information more easily accessible to users.

2018-06-15

Bill Clinton Has Written A Cyber-Thriller

Former US President Bill Clinton has co-authored a novel about a commander-in-chief going undercover to prevent a catastrophic cyber attack.

2018-06-14

New Website Design & Function.

More articles on the homepage, Service Provider listings on every page and breaking news on the @CyberSecInt ticker at the top of each page.

2018-06-15

Deaths From Cyber Attacks

Attacks that cause physical harm to systems that involve critical infrastructure are an emerging challenge and the consequences could be fatal.

2018-06-14

GDPR Isn’t Enough Protection In An Age Of Smart Algorithms

GDPR protects personal information, but what about the highly valuable inferred data produced by algorithms and used by advertisers?

2018-06-14

Chinese Hackers Steal Naval Warfare Secrets

A contractor using an unsecured network was the entry point for Chinese hackers to steal top secret data about the US Navy's submarine missiles.

2018-06-13

America Can Learn About Russian Disinformation From Europe

The information warfare tactics used in Ukraine, Estonia and elsewhere in Europe are easily replicable in the next US midterm elections.

2018-06-13

Cybercrime: Under-Reporting Gives Hackers A Green Light

The lack of successful cybercrime reporting in the UK means that cyber attackers believe there are no consequences of their actions.

2018-06-13

Google Workers Are Revolting

Thousands of Google employees have signed an open letter asking the Internet giant to stop working on a project for the US military.

2018-06-13

F-35 Is The Most Thoroughly Tested Cyber Weapon

Debugging: With almost 9m lines of software code the new warplane has been described as essentially a flying computer.

2018-06-12

Facebook Admits Privacy Settings 'Bug' Affects 14 Million Users

Bad To Worse: Forget about giving user data away to dodgy business partners, it looks like Facebook can't protect your privacy even when it wants to.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

QinetiQ

QinetiQ

QinetiQ is one of the world's leading defence technology and security companies. Areas of activity include air, land, sea and space systems, weapons, robotics, C4ISR and cyber security.

L3Harris United Kingdom

L3Harris United Kingdom

L3Harris UK (formerly L3 TRL Technology) designs and delivers advanced electronic warfare and cyber security solutions for the protection of people, infrastructure and assets.

ContentKeeper

ContentKeeper

ContentKeeper provides Web Threat Protection solutions to secure today’s Web 2.0 and mobile centric business environments.

Critical Infrastructures for Information and Cybersecurity (ICIC)

Critical Infrastructures for Information and Cybersecurity (ICIC)

ICIC addresses the demand for cybersecurity for National Public Sector organizations and civil and private sector organizations in Argentina.

Cygilant

Cygilant

Cygilant is a SOC2 certified service provider that combines MSSP and Incident Detection and Response (IDR) capabilities managed by global SOCs staffed with trained security engineers.

AdaptiveMobile Security

AdaptiveMobile Security

AdaptiveMobile Security, a world leader in mobile network security, protecting more than 2.2 billion subscribers worldwide.

Absolute IT Asset Disposals

Absolute IT Asset Disposals

Absolute IT Asset Disposals is an IT asset disposal (ITAD) company providing safe and secure recycling of IT assets.

US-Africa Cybersecurity Group (USAFCG)

US-Africa Cybersecurity Group (USAFCG)

USAFCG provides cybersecurity consulting services and delivers training programs for capacity building in Africa.

Voodoo Security

Voodoo Security

Voodoo Security is a specialized information security consulting firm focused on security assessments, risk and compliance analysis, and cloud security.

Adarma Security

Adarma Security

Adarma are specialists in threat management including SOC design, build & operation.

Bleckwen

Bleckwen

Bleckwen is a proven fraud detection system that helps financial institutions build trust with customers.

CyberAcuView

CyberAcuView

CyberAcuView is a company dedicated to enhancing cyber risk mitigation efforts across the insurance industry.

Bluewave

Bluewave

Bluewave are a strategic IT advisory company that offers businesses a simple and comprehensive way to purchase information technology solutions.

Northern Computer

Northern Computer

Northern Computer provides comprehensive IT solutions that streamline your operations and help you achieve your business goals.

Knostic

Knostic

Knostic is an early stage startup developing a risk management and governance platform designed for enterprise large language models (LLM).

Texaport

Texaport

Texaport's vision is to be the trusted partner of choice for organisations seeking comprehensive IT management and cutting-edge security solutions.

PDQ

PDQ

PDQ helps IT professionals to manage and organize hardware, software, and configuration data for Windows- and Apple-based devices.

Benchmark Executive Search

Benchmark Executive Search

Benchmark specializes in finding elite talent for startup, emerging-growth and mid-cap companies offering game-changing technologies or innovative services to the federal and commercial markets.