News

2018-01-24

Companies Are Buying Cyber Insurance 'in mad panic'

Many firms feel under siege from cyber attackers. But can insurers quantify the risk accurately and could insurance lead to corporate complacency?

2018-01-24

What Is Fog Computing?

An architecture that distributes resources of computing, storage, control and networking along the continuum from Cloud to Things.

2018-01-24

Stuxnet: The Father Of Cyberkinetic Weapons

Its the 10th anniversary of the Stuxnet attack on the Iranian nuclear weapons program. The world’s first cyber weapon opened Pandora’s box.

2018-01-23

Army Chief Urges UK To Increase Cyber Defence & Attack Capabilities

The UK’s ability to respond to threats will be eroded if the country does not keep up with its adversaries in terms of defence spending.

2018-01-23

Facebook Users To Rank The News They Trust

Facebook plans to diminish its role as an arbiter of the news people see and will rank news organisations by credibility based on user feedback.

2018-01-23

Insiders Are Behind Most Business Cybersecurity Incidents

Insider threats are a much bigger risk to cyber security than external hackers, with 74% of cyber incidents happening from within companies.

2018-01-22

The CIA Discovers It Has A Mole

The arrest of a former CIA case officer sheds light on a shadowy counterintelligence drama that has been playing out for nearly eight years.

2018-01-22

How To Handle A Cyber Crisis

An unnamed Canadian Bank didn’t know how to publicly manage a cyber crisis and called in the experts. Here is their advice.

2018-01-22

Twitter Reveals True Extent Of Russian US Election Posts

Twitter has admitted that a far greater number of Russia-linked accounts posted material about the 2016 US election than it has previously disclosed.

2018-01-22

Massive Breach: 3m Healthcare Records Compromised

Healthcare records of three million Norwegians compromised in "professional" cyber attack.

2018-01-19

The Big Online Advertising Swindle

Fake news, concerns over privacy and political manipulation are some of the issues swirling around social media. There is also advertising fraud.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Forensic Control

Forensic Control

Forensic Control specialise in providing simple & straightforward Cyber Security to organisations, helping them assess, prevent and respond to cyber threats.

Karamba Security

Karamba Security

Karamba provide an IoT Security solution for ECUs in automobiles which ensures that all cars are protected (not just autonomous cars).

enSilo

enSilo

enSilo secures customers data on premise or in the cloud. Regardless of the where the threat comes from, enSilo can protect your data.

Muninn

Muninn

At Muninn (aka Wehowsky), we specialize in mitigating potential risks within your network, providing one of the leading network detection and response (NDR) solutions on the market.

Cybonet

Cybonet

Cybonet provides easy to deploy, flexible and scalable security solutions that empower organizations of all sizes to actively safeguard their networks in the face of today’s evolving threats.

Specops Software

Specops Software

Specops Software is a leading password management and authentication solution vendor.

HackHunter

HackHunter

HackHunter’s passive sensor network continuously monitors, detects and alerts when a malicious WiFi network and/or hacking behaviour is identified.

Stratosphere Networks

Stratosphere Networks

Stratosphere Networks offer managed cybersecurity services rooted in Managed Detection and Response and Security Operations Center services that our team can tailor to meet your needs.

SHe CISO Exec

SHe CISO Exec

SHe CISO Exec is a sustainable global training and mentoring platform in information security and leadership.

Technology Innovation & Startup Centre (TISC)

Technology Innovation & Startup Centre (TISC)

TISC is a startup incubator at the Indian Institute of Technology Jodhpur (IITJ) and we back deep-tech startups.

11:11 Systems

11:11 Systems

11:11 Systems synchronizes every aspect of network services for your business. Build your network with the industry’s most trusted expert skills.

Atlantic Data Security

Atlantic Data Security

Atlantic Data Security is skilled in the analysis, recommendation, deployment, and management of all critical components of the security infrastructure.

Recast Software

Recast Software

Recast Software exists to simplify the work of IT teams and enable them to create highly secure and compliant environments.

Lightpoint Global

Lightpoint Global

Lightpoint Global is a bespoke software development company. We also provide a spectrum of services such as IT consulting, business analysis, QA and testing, and DevOps services.

Telenor Cyberdefence

Telenor Cyberdefence

Telenor Cyberdefence is a newly established (2024) cloud-born Managed Security Service Provider focused on the Nordic markets.

GoCloud Systems

GoCloud Systems

GoCloud is an IT consulting firm. We provide IT strategy and cloud adoption services to the New Zealand Government, Non-Profit Organisations and private industry.