News

2017-09-11

Car Industry In Crisis Over AI and Hackers

Car security technology requires broad, sweeping changes in standards and the ways in-vehicle networks and devices are made to become secure.

2017-09-07

‘Decoys’ To Reinforce Japan’s Defenses Against Cyber-attacks

As regional tensions deepen, Japan’s Communications Ministry is creating decoy computer systems to combat cyber-attacks,

2017-09-11

Police Spy On Their Own: Twitter Accounts Scrutinised

Revealed: A year-long probe into the anonymous Twitter accounts of officers of the Police Service of Northern Ireland (PSNI).

2017-09-05

Uber’s U-Turn On User Watching

Uber will stop its controversial practice of tracking users for up to five minutes after a trip has ended, as it attempts to improve its public image.

2017-09-07

Businesses Need Cyber Insurance – Now!

The major risk to businesses that are victimised by cyber breaches is the reputational damage that can follow.

2017-09-07

Trump's Top Cybersecurity Advisors Resign

Several leading members of the National Infrastructure Advisory Council (NIAC), a part of US Homeland Security have resigned. Why?

2017-09-13

AI Attacks Are Just Around The Corner

Hackers will get help from robots and artificial intelligence and the first AI-enhanced cyber-attack could come in the next 12 months.

2017-09-07

A New Form Of Ransomware Attacks UK Hospital

A UK NHS hospital group which suffered at the hands of the WannaCry outbreak has fallen victim to a further ransomware attack.

2017-09-12

IoT For Business & Creating 'Digital Twins'

If your organisation is planning to leverage the Internet of Things it needs to become familiar with the concept of the “digital twin.”

2017-09-08

Crime Has Become Cybercrime

'Ordinary' criminals are making an easy transition to becoming cybercriminals and are beginning to remodel their organizations for greater efficiency.

2017-09-11

Is The US Constitutional Right To Free Speech Threatened Online?

The fate of the Daily Stormer, a Nazi hate site that has been kicked off the Internet, signals the increasing irrelevance of the 1st Amendment.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Nutanix

Nutanix

The Nutanix enterprise cloud platform provides performance, robust security, and seamless application mobility for a broad range of enterprise applications.

EC-Council

EC-Council

EC-Council is a member-based organization that certifies individuals in various e-business and information security skills.

CLUSIS

CLUSIS

CLUSIS is an association for the information security industry in Switzerland.

IMS Networks

IMS Networks

IMS Networks specializes in the design and management of high criticality networks and telecoms services including network security and Managed Security Services.

CERT-UG/CC

CERT-UG/CC

CERT-UG/CC is the national Computer Emergency Response Team for Uganda, operating under the National Information Technology Authority (NITA-U)

ComCERT

ComCERT

ComCERT SA is an independent, private consulting company focusing in the assistance of its customers facing the dangers of cyber threats and security incidents.

CERT Tonga

CERT Tonga

CERT Tonga is the national Computer Emergency Response Team for Tonga.

Vigilant Software

Vigilant Software

Vigilant Software develops industry-leading tools for intelligent, simplified compliance, including ISO27001-risk management and EU GDPR.

Pivot Point Security

Pivot Point Security

Pivot Point Security is a trusted leader in information security consulting. We help clients master their information security management systems.

Veridium

Veridium

Veridium is a leader in single step - multi factor biometric authentication, designed to safeguard enterprises’ most critical assets.

ByteSnipers

ByteSnipers

ByteSnipers specialize in penetration testings and secure development services. Our focus is on your security.

Contechnet Deutschland

Contechnet Deutschland

Contechnet Deutschland started as a specialist in the area of IT disaster recovery and has since broadened its portfolio into information security and data protection.

Mosaic Insurance

Mosaic Insurance

Mosaic is a next-generation global specialty insurer distinguished by an exceptional team, agile technology, and a structure that combines Lloyd’s of London strength with a global distribution network

SecZone

SecZone

SecZone is a Chinese enterprise with a mission to "Make It Secure." We are dedicated to driving software security innovation globally.

e-Safer

e-Safer

e-Safer's mission is to provide solutions and services that ensure a safer digital environment.

CSIRT-Gnd

CSIRT-Gnd

CSIRT-Gnd provides 24x7 Computer Security Incident Response Services to citizens, companies and government agencies in Grenada.