News

2017-12-04

British Police Lose Phone & Web Search Powers

Mass harvesting of personal communications data can only be considered lawful if accompanied by strong independent & judicial safeguards.

2017-12-02

NSA Employee Pleads Guilty To Stealing Classified Information

A former NSA employee illegally took classified documents which were later stolen from his home computer by hackers working for Russian spies.

2017-12-01

Paying For The UK’s Cyber War With Russia

The UK Government is torn over whether to cut funding for conventional forces to spend more of the Defence budget on cybersecurity measures.

2017-12-01

What Is the Dark Web? Can You Access It?

Careful: The Dark Web can be visited by anyone, but it is difficult to work out who is behind the sites & dangerous if your identity is discovered.

2017-12-01

Toyota Is Making Humanoid Workers

Neither Replicant nor Robocop: Toyota has designed a human assistance robot with a range of applications that is meant to be 'Fun & Friendly'.

2017-11-30

Replaying Crime Scenes With An Advanced Scanner

Canadian police forces use a forensic laser scanner capable of detecting the tiniest of details and recreate collisions and crime scenes in 3D.

2017-11-30

Cyber Criminals Stealing Reward Points & Air-Miles

Russian-speaking countries pose the “number one cyber-crime threat to the UK” as cyber criminals focus on stealing victims' reward points & air-miles.

2017-11-29

Apple Must Fix Its Embarrassing Password Bug

A security researcher has uncovered a bug in Apple macOS High Sierra so remarkably simple, it is described as a "howler" and "embarrassing".

2017-11-29

N. Korea Is Ready For Global Cyber Conflict

Not content with ICBMs, N Korea is also capable of causing damage worldwide through cyber-attacks on selected targets in defense, industry & media.

2017-11-29

Startups Are Changing The Future Of Cybersecurity

The 2017 WIRED Security Conference cast a spotlight for investors on some of the brightest prospects in the cybersecurity startup sector.

2017-11-28

GDPR Will Impact Data Management In The USA

You don’t have to have physical operations in Europe to be affected by the GDPR and failure to prepare can result in crippling fines.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Atlantic Council

Atlantic Council

The Atlantic Council's Cyber Statecraft Initiative focuses on international cooperation, competition, and conflict in cyberspace.

Delphix

Delphix

Delphix is the industry leader for DevOps test data management.

Cyber Security Centre - University of Hertfordshire

Cyber Security Centre - University of Hertfordshire

The Cyber Security Centre provides training, teaching and research in the fast paced topics of cyber security and digital forensics.

Actiphy

Actiphy

Actiphy provides a tried and proven backup and disaster recovery software solution to ensure business continuity at all times.

VU Security

VU Security

VU is a specialist in Cybersecurity software development with a focus on the prevention of fraud and identity theft.

Elliptic

Elliptic

Elliptic solve the crucial problem of identity in cryptocurrencies, with the sole purpose of combating suspicious and criminal activity.

Utility Cyber Security Forum

Utility Cyber Security Forum

The Utility Cyber Security Forum offers a focused venue in which utility executives can network one-on-one with colleagues facing issues in protecting against cyber attacks.

Wayra

Wayra

Wayra connects Telefónica and technological disruptors around the world. As their preferred strategic partner, we scale them up to accelerate their business and ours.

CoursesOnline

CoursesOnline

CoursesOnline.co.uk is a database listing IT security courses from providers across the UK.

UK Cyber Security Council (UKCSC)

UK Cyber Security Council (UKCSC)

The role of The UK Cyber Security Council is to champion the cybersecurity profession across the UK, provide representation for the industry, accelerate awareness and promote excellence.

META-Cyber

META-Cyber

META-cyber was founded by engineers with experience in process and control-protection to provide cyber security for industrial infrastructure.

The Cyber Guild

The Cyber Guild

The Cyber Guild is a not-for-profit organization working to improve the understanding and practice of cybersecurity, and to help raise awareness and education for all.

TriCIS

TriCIS

TriCIS design and engineer highly secure integrated solutions that meet the highest government and military security standards, providing information assurance to organisations across the globe.

Semgrep

Semgrep

Semgrep is a fast, open-source, static analysis tool for profoundly improving software security and reliability.

Manifest

Manifest

Manifest is a cybersecurity company dedicated to helping enterprises secure their software supply chains.

SENTRIQS

SENTRIQS

SENTRIQS advanced encryption technology is engineered to defend against the most sophisticated cyber threats, keeping your operations efficient and secure.