News

2017-02-03

Ransomware- Practical Advice To Protect & Recover Using Free Tools

There are concrete strategies & commercial tools available to use to protect yourself against ransomware attacks. By Dinesh Kumar Aggarwal

2017-01-30

Directors Report January 2017. Cyber Security Checklist For Management (£)

Cyber attacks are increasing and they are becoming both more focused and more damaging, targeting sensitive financial & commercial data.

2017-01-30

Hacker, Tailor, Soldier, Spy: Future Cyberwar

Lights Out: Someone wants the power down. Someone is sowing chaos and waiting to take advantage. This is how a cyber war begins.

2017-01-30

Director's Departure Leaves A Big Hole At GCHQ

The early departure of Robert Hannigan as UK’s GCHQ chief, marks not so much the end of an era as the transition between eras.

2017-01-26

Cyber Criminals Set to Get ‘Creative’ in 2017

KPMG think that IoT threats, new EU data laws and industrial scale cybercrime will be the dominant cybersecurity issues in 2017.

2017-01-25

UK Bank Fraud Landmark: TSB Repays Victim & Admits Giving Criminals Bank Accounts

British high street bank TSB has compensated a fraud victim on the grounds that it was at fault for allowing a criminal to operate a current account.

2017-01-27

British NHS Hospital Trust Under Cyber Attack

The largest National Health Service hospital trust in England has been infected with a virus affecting thousands of sensitive files.

2017-01-25

Defence Research Agency To Create Secure Data-Sharing Tech

DARPA is working on new ways to enable US troops working in remote areas to securely send and receive sensitive information on their devices.

2017-01-25

Nissan Self-Drive Trial Begins In London

Nissan will start testing its electric Leaf car with autonomous driving capabilities in London, beginning its first European trials on public roads.

2017-01-31

How Cyber Propaganda Influenced Politics in 2016

Fake News & Hackers: Throughout history, politically motivated threat actors have tried to influence public opinion to reach their goals.

2017-01-31

US Army Wants To 3D-Print Mini-Drones

Build It Yourself: Future soldiers will make their own eyes-in-the-sky on the go.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

AlgoSec

AlgoSec

The AlgoSec platform enables the world’s most complex organizations to gain visibility, reduce risk and process changes at zero-touch across the hybrid network.

Black Hat Briefings

Black Hat Briefings

The Black Hat Briefings are a series of highly technical information security conferences that bring together thought leaders from all facets of the infosec world.

Zertificon Solutions

Zertificon Solutions

Zertificon is a leader in professional email encryption and data security.

National Information Technology Development Agency (NITDA) - Nigeria

National Information Technology Development Agency (NITDA) - Nigeria

The National Information Technology Development Agency (NITDA) is committed to implementing the Nigerian National Information Technology Policy.

Center for Analysis & Investigation of Cyber-Attacks (CAICA)

Center for Analysis & Investigation of Cyber-Attacks (CAICA)

The Center for Analysis & Investigation of Cyber-Attacks is one of the leading Kazakhstan organisations in the field of information and computer security.

Cambridge Cybercrime Centre

Cambridge Cybercrime Centre

The Cambridge Cybercrime Centre is a multi-disciplinary initiative combining expertise from the Department of Computer Science and Technology, Institute of Criminology and Faculty of Law.

Wiser Market

Wiser Market

Wiser Market is a leading company in global online brand protection services, intellectual property protection, anti-Counterfeit & trademark infringements.

NVISIONx

NVISIONx

NVISIONx data risk governance platform enables companies to gain control of their enterprise data to reduce data risks, compliance scopes and storage costs.

ITProTV

ITProTV

ITProTV is part of the ACI Learning family of companies providing Audit, Cyber, and IT learning solutions for enterprise and consumer markets.

Digistor

Digistor

Digistor is a leading manufacturer of industrial-grade flash storage products, secure storage products, and Removable Secure Data Storage.

Transparity Cyber

Transparity Cyber

Transparity Cyber is dedicated to cybersecurity. As part of the Transparity Group we’re an established name in the Microsoft Cloud landscape, with a focus on cybersecurity excellence.

Wavenet

Wavenet

Wavenet has grown from simple beginnings to become one of the UK’s market leaders in unified communications, business telephony, and Cyber Security solutions.

Teleskope

Teleskope

Teleskope are on a mission to empower businesses to protect sensitive data by default.

Auxilion

Auxilion

Auxilion is an award-winning provider of consulting and IT support services, technologies and consulting for public and private organisations in the UK and Ireland.

Miggo Security

Miggo Security

Miggo is the first Application Detection and Response (ADR) platform on a mission to stop application breaches.

Dispel

Dispel

Dispel makes the fastest secure remote access for industrial networks. Built by operators for operators: a zero trust engine for your entire OT, IoT, and xIoT stack.