News

2018-03-09

Artificial Intelligence Is Cyber Defence

AI can help spot trends, patterns and anomalies in data that the naked eye cannot discern to identify and mitigate proliferating new types of malware.

2018-03-07

Cybercriminals Use Fake Websites

Criminal tricks include websites disguised as crypto-currency exchanges or fake services offering cloud mining. But the users always lose their money.

2018-03-13

Does Fake News Affect Threat Intelligence?

The concept of ‘fake news’ has plagued media for the past couple of years, but what is its impact upon business-level cybersecurity?

2018-03-12

Autonomous Cars Hit The Road In California

Look - No Hands: Tech companies and others working on driverless vehicle systems will begin trialling their cars without a safety driver present.

2018-03-09

Russian Hacker False Flags Work - Even After They're Exposed

False Flag identities for nation-state hackers are just as standard a part of the toolkit as phishing links and infected Microsoft Office attachments.

2018-03-08

Bill Gates Says Cryptocurrencies Are Deadly

Bill Gates is concerned by cryptocurrency, saying that the anonymity offered by the new technology has “caused deaths in a fairly direct way”.

2018-03-15

Real Dangers of Artificial Intelligence

Every AI advance by the good guys is also an advance for the bad guys, according to a panel of academic experts, warning of its malicious use.

2018-03-15

Russia Has Lasers To Shoot Satellites

Russian defense companies have created a plane-mounted laser that can hit satellites, to achieve "destruction of those elements deployed in orbit.”

2018-03-07

Cybercime Against UK Business Is Up 63%

UK Office for National Statistics reports that incidents involving computer misuse and malware against business are significantly up.

2018-03-14

The Mysteries Of Crypotocurrencies

No aspect of the crypto-currency and blockchain space has been as poorly understood as the initial coin offering (ICO). Regulators want clarity.

2018-03-12

Cyber Criminals Catch Up With Nation-States

The trickle-down effect of advanced “military-grade” tools is seeing the gap between cyber-criminal & nation state attack capabilities closing.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

SABSACourses

SABSACourses

SABSA is a development process used for solving complex problems such as IT Operations, Risk Management, Compliance & Audit functions.

CloudEndure

CloudEndure

CloudEndure offers Disaster Recovery and Continuous Replication for the Cloud.

QASymphony

QASymphony

QASymphony software testing and QA tools help companies create better software by improving speed, efficiency and collaboration during the testing lifecycle.

Allgress

Allgress

Allgress solutions converge disparate risk silos across enterprise networks and automate governance, risk and compliance management processes.

Cellebrite

Cellebrite

Cellebrite delivers comprehensive solutions for mobile data forensics and mobile lifecycle management.

Namogoo

Namogoo

Namogoo’s disruptive technology identifies and blocks unauthorized product ads that are injected into customer web sessions by client-side Digital Malware.

Kryptus

Kryptus

Kryptus provides a wide array of solutions for hardware, firmware and software ranging from semiconductors to complex digital certificate management systems.

Canadian Institute for Cybersecurity (CIC)

Canadian Institute for Cybersecurity (CIC)

The Canadian Institute for Cybersecurity (CIC) is a comprehensive multidisciplinary training, research and development, and entrepreneurial unit.

German Accelerator

German Accelerator

German Accelerator supports high-potential German startups in successfully entering the U.S. and Southeast Asian markets.

Pentest Limited

Pentest Limited

Pentest Limited provide information security consultation, penetration testing & red teaming services to companies across the globe.

CliftonLarsonAllen (CLA)

CliftonLarsonAllen (CLA)

CLA exists to create opportunities for our clients through industry-focused advisory, outsourcing, audit, tax, and consulting services.

Ward Solutions

Ward Solutions

Ward Solutions are an information security consultancy and managed services company. We help organisations protect their brand, people, assets, intellectual property and profits.

Mondoo

Mondoo

Mondoo is a powerful security, compliance, and asset inventory tool that helps businesses identify vulnerabilities, track lost assets, and ensure policy compliance across their entire infrastructure.

Whitaker Brothers

Whitaker Brothers

Whitaker Brothers data destruction equipment can be found in 115 countries and every single continent in the world, from major military organizations to small offices.

Icon Information Systems (ICONIS)

Icon Information Systems (ICONIS)

ICONIS is an integrated infrastructure and service provider, offering unified Information Technology (IT) solutions globally.

eGeneration

eGeneration

eGeneration is one of the leading technology solutions and system integration companies in Bangladesh.