News

2018-03-20

Cybersecurity At Sea

Cybersecurity demands board room level attention as well as vigilance from all employees, be they in head office or out on the water.

2018-03-20

On Twitter Fake News Gets More Traction Than Truth

MIT scientists find evidence that Fake News spreads farther, faster, deeper and more broadly than the Truth in all information categories.

2018-03-20

Charities Are Vulnerable To Severe Cyber Attacks

The UK's National Cyber Security Centre is warning British charities could be at risk from a series of devastating cyber-attacks.

2018-03-22

Millennials More Likely To Fall Victim To Cybercrime

Millennials aged 20 - 29 are more likely to fall victim to online and phone-based scams than the 70-plus age group.

2018-03-21

UK Will Have Driverless Cars By 2021

In 2021 the UK government intends the country to be well on its way to a driverless future.

2018-03-20

How AI Has Conquered Democracy

Big Data analysis can maximise the effectiveness of an election campaign and use of AI techniques in politics is not going away anytime soon.

2018-03-19

Big Data And AI For Predicting Human Behaviour

Artificial intelligence has set a benchmark in every other industry and is now all set for behavioral science.

2018-03-19

Ensure Your Cloud Storage Is Compliant With GDPR

Its not just EU organisations: If your website captures visitors’ IP addresses and you have five a year from European countries, GDPR affects you.

2018-03-19

US Accuses Russia Of Attacking Energy Infrastructure

The US has accused Russia of a wide-ranging cyber-assault on its energy grid and other key parts of its critical infrastructure.

2018-03-19

Dark Web Fraud Undetectable By Police

Identity fraudsters are getting smarter, more organised and the police are finding it harder to track them down.

2018-03-19

Millions Of Facebook Profiles Were ‘Harvested’ In US Election Breach

50m Facebook profiles were collected and analysed for the Trump campaign by Cambridge Analytica in a huge data breach.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Packet Storm

Packet Storm

Packet Storm is an online resource for security tools, whitepapers, exploits, and advisories on computer security issues.

Open Networking Foundation (ONF)

Open Networking Foundation (ONF)

The Open Networking Foundation (ONF) is a non-profit operator led consortium driving transformation of network infrastructure and carrier business models.

Cybereason

Cybereason

Cybereason provides real-time detection of malicious activity enabling you to identify the cause and scope of an attack and ensure an effective response.

Masergy Communications

Masergy Communications

Masergy delivers hybrid networking, managed security and cloud communication solutions to enterprises around the globe.

Online Business Systems

Online Business Systems

Online Business Systems is an information technology and business consultancy. We design improved business processes enabled with robust and secure information systems.

NETAS

NETAS

Netas offers solutions in information and communication technologies including end-to-end value added solutions, system integration and technology services to providers and corporations.

Cask Government Services

Cask Government Services

Cask Government Services focuses on program management, cybersecurity, logistics, business analysis and engineering services for Federal, State and Local Government.

Matias Consulting Group (MCG)

Matias Consulting Group (MCG)

Your Business needs competitive and resilient ICT solutions. MCG defines, deploy & support them enabling you to focus on your core business.

Greensafe IT

Greensafe IT

Greensafe offer various onsite and offsite data erasure services, aimed at increasing data security whilst reducing any risk of data loss during transit.

SafeHouse Technologies

SafeHouse Technologies

SafeHouse is a cloud-based, high-end cybersecurity platform that can secure and insure any device that is connected to it.

e.Kraal Innovation Hub

e.Kraal Innovation Hub

e.Kraal is a Cybersecurity Innovation Hub whose mission is to secure the future of Cybersecurity in Kenya by accelerating innovation and creativity in the cyberspace ecosystem.

Theta432

Theta432

THETA432 is a cybersecurity firm that provides 24/7/365 managed prevention, detection, response, Hybrid SOC, cyber defense monitoring services with dynamically defined defense (3D™).

Bastion Networks

Bastion Networks

Bastion are a security-focussed managed solution provider and consultancy. We work with advanced cyber security vendors to produce managed security solutions to protect from online threats.

DarkFeed

DarkFeed

DarkFeed is a Threat Intelligence provider that monitors the darknet in real-time, where hackers and Cyber criminals are most active.

Nagomi Security

Nagomi Security

Nagomi is changing the way security teams balance risk and defense, empowering customers to focus on what matters now.

Aberrant

Aberrant

A radically new approach to managing information security. Aberrant is the single pane of glass through which a security program can be viewed.