News

2017-07-18

Reinventing Cold War Spy Craft

State-sponsored hackers are adopting classic espionage techniques which are being reinvented for the modern era of spying.

2017-07-18

Do British Police Take Cyber Crime Seriously?

The UK National Audit Office reports that regional police forces are overlooking the growth in cybercrime. Police chiefs are trying to respond.

2017-07-18

AI And Robotics Can Fight Cyber Crime

New techniques in AI, Machine Learning and Quantum Computing can massively improve the speed of cyber crime detection & prevention.

2017-07-18

Cybersecurity: The Cold War Online

The Internet is under attack, and not just by hackers, thieves and spies. Cyber-space is becoming a war zone in a new era of ideological combat.

2017-07-17

Terrorist Activities On Social Media

The financial services sector is required to report suspicious transactions. Should the same apply to suspicious communications on social media?

2017-07-17

Cyber Caliphate's Scorecard

The Cyber Caliphate is really good at social media & communications but is still learning when it comes to cyber-attack expertise.

2017-07-17

US Marines Embrace Cyber Warfare

In the Halls of Montezuma: Collecting enemy cellphones, gathering forensic intelligence, flying surveillance drones, electromagnetic disruption.

2017-07-17

WikiLeaks Reveal CIA Credentials Malware

Both WannaCry and Petya ransomware attack waves are thought to originate in stolen NSA exploits. Wikileaks reveals there are many more.

2017-07-14

Biometric Products Can Help Cybersecurity

65 percent of large firms in the UK detected a cybersecurity breach or attack in the past year. Adding biometrics to cybersecurity could fix that.

2017-07-14

Who Is Behind Petya?

Petya has several different names, but the experts at ESET say the origins of this destructive ransomware lie in one direction.

2017-07-13

Are Corporate Cyber Defenses Adequate?

It’s not just about the technology: Business leaders should be focusing on their companies’ systemic risks, rather than just software.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Be Cyber Aware At Sea

Be Cyber Aware At Sea

Be Cyber Aware At Sea is a global maritime and offshore industry initiative to raise awareness and educate crew members and the offshore workforce.

BlackBerry Security Services

BlackBerry Security Services

Blackberry provides intelligent security software and services to enterprises and governments around the world.

Raytheon Technologies

Raytheon Technologies

Raytheon Intelligence & Space delivers solutions that protect every side of cyber for government agencies, businesses and nations.

QA

QA

QA is a leading IT training provider in the UK with over 1,500 courses covering all areas of IT including Cyber Security.

National Security Authority (NBU) - Slovakia

National Security Authority (NBU) - Slovakia

The National Security Authority (NBU) is the central government body in Slovakia for the Protection of Classified Information, Cryptographic Services, Trust Services and Cyber Security.

Pipeline Security

Pipeline Security

Pipeline Security protects businesses with real-time threat data, threat detection & prevention, continuous cyber security monitoring and security analytics.

Cybeats Technologies

Cybeats Technologies

Cybeats delivers an integrated security platform designed to secure and protect high-valued connected devices.

Civic Technologies

Civic Technologies

Civic’s Secure Identity Platform (SIP) uses a verified identity for multi-factor authentication on web and mobile apps without the need for usernames or passwords.

Experis

Experis

Experis provide IT resourcing, project solutions and managed services. We enable organizations to cultivate individuals and teams prepared for the digital age.

Arcturus Security

Arcturus Security

Arcturus is a CREST-approved cyber security consultancy created by experts in the field.

FoxTech

FoxTech

FoxTech is an independent, friendly and deeply specialised cyber security company in the UK, with expertise spanning decades of Public Sector and Government services.

Allurity

Allurity

Allurity is a group of tech-enabled cybersecurity service providers, comprised of best-in-class experts with a common mission to enable a safe digital world.

Benchmark IT Services (BITS)

Benchmark IT Services (BITS)

BITS is a leading cyber security company in Australia. Our certified professionals work with you to keep your data assets safe and secure.

Cognna

Cognna

Cognna's innovative platform is designed to empower you and your team, providing the tools you need to detect, prevent, and resolve threats with ease.

Reach Security

Reach Security

Reach is the first generative AI platform purpose-built to empower enterprise security teams. With Reach, organizations measure, manage, and improve their enterprise security posture at scale.

DigitalXForce

DigitalXForce

DigitalXForce is the Digital Trust Platform for the New Era – SaaS based solution that provides Automated, Continuous, Real Time Security & Privacy Risk Management.