News

2018-06-04

Japan’s Secret Spy Agency

Like any other advanced economic power, Japan operates a significant intelligence and surveillance apparatus. Here is an outline.

2018-06-01

N Korean Cyber Attacks Continue Despite Peace Talks

Experts see an intensification in the level of cyber attacks from N Korea in the build up to talks with S Korea and the US on de-nuclearisation.

2018-05-31

Quantum Computing - What You Should Know

As conventional computing technology matures and with an insatiable demand for more power, there is a growing interest in quantum computing.

2018-06-01

Countering Electoral Interference

Russia’s campaign targeting the 2016 US election shows the how deeply democratic processes can be undermined using communications technology.

2018-05-31

FBI Seizes Control Of Russian Botnet

FBI agents have seized control of a key server in the Kremlin’s global botnet of 500,000 hacked routers, allowing the victims to be identified.

2018-05-30

GDPR - More People Will Share Data

One effect of GDPR will be to increase consumer confidence, making users more likely to share personal data with organisations they trust.

2018-05-30

Denmark Under Attack

Two out of three businesses surveyed have been on the receiving end of cyber-attacks in the last year, with one in eight of those attacks successful.

2018-05-30

A Cyber Attack Could Cripple The UK

The chief of British military intelligence makes a rare public statement warning of the UK's vulnerability to a major cyber attack.

2018-05-30

Mexican Bank Hack Led To A Cash Flight

Several Mexican banks have experienced large cash withdrawals after possible cyber attackers infiltrated the central bank payments system.

2018-05-29

Is The US Heading Toward A Cashless Economy Via Blockchain?

The banking industry is starting to believe it's only a matter of time before central banks adopt a form of digital currency that looks like Bitcoin.

2018-05-29

Business Cyber Security Strategy

The Corporate Board is ultimately accountable for the protection of corporate systems and they need to develop a robust cyber security policy. (£)

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Help Net Security

Help Net Security

Help Net Security has been a prime resource for information security news and insight since 1998.

Retail & Hospitality Information Sharing & Analysis Center (RH-ISAC)

Retail & Hospitality Information Sharing & Analysis Center (RH-ISAC)

Retail & Hospitality ISAC operates as a central hub for sharing sector-specific cyber security information and intelligence.

Pole SCS (Secure Communicating Solutions)

Pole SCS (Secure Communicating Solutions)

SCS is a world-class competitiveness cluster dedicated to digital technologies in the fields of Microelectronics, Internet Of Things, Digital Security, Artificial Intelligence And Big Data.

S21sec

S21sec

S21sec is a leading European pure play cybersecurity consultancy, services and solutions provider.

VigiTrust

VigiTrust

VigiTrust is a security firm specializing in cloud based eLearning programs, security compliance portals and providing security assessments.

Intrinsyc Technologies

Intrinsyc Technologies

Intrinsyc provides product development services and Edge Computing modules that are helping to take the Internet of Things products to the next level.

Concordium

Concordium

Concordium aims to build the world’s leading open-source, permissionless, and decentralized blockchain with built-in user identity at the protocol level.

ITsMine

ITsMine

ITsMine’s Beyond DLP solution is a leading Data Loss Prevention solution used by organizations to protect against internal and external threats automatically.

AEWIN Technologies

AEWIN Technologies

AEWIN is professional in the fields of Network Appliance, Cyber Security, Server, Edge Computing and an ODM/OEM expert.

Retruster

Retruster

Protect your users against phishing emails, ransomware & fraud with the most advanced, user-friendly, non-intrusive solution available.

BlueCat Networks

BlueCat Networks

BlueCat is the Adaptive DNS company. Our mission is to help the world’s largest organizations thrive on network complexity, from the edge to the core.

Cytek

Cytek

Cytek is a leading provider of cybersecurity and HIPAA compliance for dental practices and other industries.

MajorKey Technologies

MajorKey Technologies

MajorKey improves security performance by reducing user friction and business risk, empowering your people, and protecting your IP.

Zally

Zally

Using advanced behavioural biometrics and AI, Zally is the world's answer to next-generation security.

CardinalOps

CardinalOps

The CardinalOps platform continuously assesses your detection posture and eliminates coverage gaps in your existing detection stack so you can easily implement a threat-informed defense.

Amtivo Ireland

Amtivo Ireland

Amtivo Ireland (formerly Certification Europe and EQA) offers a range of certifications and related services.