News

2017-02-03

Why Are Hackers After Healthcare Records?

Information hacked from a Financial Institution or Bank is quickly rendered useless. Classified Healthcare data has continued value lasting a lifetime.

2017-02-01

Kaspersky Lab Employee Arrested On Treason Charges

A leading cybercrime investigator at top security firm Kaspersky Lab has been arrested in Russia where he could face charges for high treason.

2017-02-06

Autonomous Robots Will Deliver Your Lunch

Forget About Deliveroo: These robots are designed to work in a two to three- mile radius and make deliveries in 15 to 30 minutes.

2017-02-03

Stuxnet, Secrecy & The New Era of Cyber War

Should Cyber weapons be subject to international controls & protocols in the same way as nuclear and some other conventional weapons?

2017-02-06

Business Can Minimise Cybersecurity Risks And Drive Profit

CIOs are under pressure to deliver on the promise of digital technologies to transform customer-facing services & internal processes.

2017-02-03

Spanish Police Arrest Banking Malware Suspect

Spanish police have arrested a Russian programmer suspected of developing the Neverquest banking Trojan.

2017-02-01

New Technology To Really Close The US / Mexican Border

Despite President Trump’s executive orders to extend walls along the US-Mexico border, real border security will likely take longer than he thinks.

2017-02-01

True Extent Of UK Cybercrime & Fraud Revealed

The Crime Survey for England and Wales shows an estimated 3.6 million cases of fraud and 2 million computer misuse offences in a year.

2017-02-06

Artificial Intelligence Gives Business Wings

Solutions powered by AI will displace jobs with the biggest impact felt in transportation, logistics, customer service & consumer services.

2017-02-01

Emerging Details Of Cyber Assault On A Major UK Bank

Lloyds Bank admits it was was the target of a recent cyber attack which blocked a substantial number of customers using their online accounts.

2017-02-03

Ransomware- Practical Advice To Protect & Recover Using Free Tools

There are concrete strategies & commercial tools available to use to protect yourself against ransomware attacks. By Dinesh Kumar Aggarwal

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Exclusive Networks

Exclusive Networks

Exclusive Networks accelerate market entry and growth for innovative cybersecurity, networking and infrastructure technologies.

Owl Cyber Defense

Owl Cyber Defense

Owl patented DualDiode Technology enables hardware-enforced network segmentation and deterministic, one-way transfer of all data types and file sizes.

Cybersecurity Credentials Collaborative (C3)

Cybersecurity Credentials Collaborative (C3)

C3 provides a forum for collaboration among vendor-neutral information security and privacy and related IT disciplines certification bodies.

Digital Hands

Digital Hands

Digital Hands is an award-winning managed security services provider.

National Center for Manufacturing Sciences (NCMS)

National Center for Manufacturing Sciences (NCMS)

NCMS is a cross-industry technology development consortium, dedicated to improving the competitiveness of the US industrial base. Strategic initiatives include industrial cyber security.

Infopulse

Infopulse

Infopulse is a global provider of Software Engineering, Cloud & IT Infrastructure Management, and Cybersecurity services.

NTIC Cyber Center

NTIC Cyber Center

NTIC Cyber Center is an organization dedicated to making the National Capital Region (Washington DC) more resilient to cyber-attacks.

Sierra Ventures

Sierra Ventures

Sierra Ventures is an early-stage venture firm investing globally with a focus on Next Generation Enterprise and Emerging Technologies.

Secure Ideas

Secure Ideas

Secure Ideas is focused on penetration testing and application security including web applications, web services and mobile applications.

SEMNet

SEMNet

SEMNet is an IT solutions provider and an infrastructure and security consulting firm.

KirkpatrickPrice

KirkpatrickPrice

KirkpatrickPrice is dedicated to providing you with innovative security guidance and efficient audit services.

Trace3

Trace3

Trace3 is a pioneer in business transformation solutions, empowering organizations to keep pace with the rapid changes in IT innovations and maximize organizational health.

Clarabot Nano

Clarabot Nano

Nano is the secure file sharing tool to improve content search, data access and collaboration between multiple parties.

Iolo

Iolo

Iolo develops patented technology and award-winning software that repairs, optimizes, and protects computers, to maximize system speed and performance while keeping them safe.

Ionize

Ionize

Ionize offers solutions to help you uplift your capability across the full-spectrum of cyber security - assessment, remediation, monitoring, governance and ongoing education.

Vault Cloud

Vault Cloud

Vault Cloud, Australia's National Cloud, is an Australian owned and operated company specialising in secure, sovereign, hyperscale cloud infrastructure.