News

2016-12-08

Rise Of The Machines

The Institute for Critical Infrastructure Technology (ICIT) say the Mirai Botnet attack on Dyn was just a rehearsal for an even bigger event.

2016-12-08

Next 3 Years Most Critical Of All For Technology

About 40% of CEOs think they will be running a completely different entity in the next three years.

2016-12-08

Banks Plan To Hoard Bitcoins

Big banks planning to stockpile bitcoins in order to pay off cyber criminals who threaten to bring down their critical IT systems.

2016-12-07

Just How Safe Is Online Banking?

Banking online is convenient, but how can you you protect against your accounts being emptied by fraudsters? Here is some useful advice.

2016-12-07

Yes, Russia Weaponised Social Media In The US Elections

Russia didn't just hack & leak documents from US political groups, it used social media as a weapon to influence perceptions about the election.

2016-12-07

Half The World's Population Is Not Yet On The Internet.

Room For Growth: More than half of the world's population still isn't using the Internet.

2016-12-07

What Are The Big Cyber Threats In 2017?

It looks like 2016 will be remembered as the year of the data breach and several obvious threats are likely to feature next year.

2016-12-06

AI Beating Humans? Not In My lifetime, Says Google Chief

The head of Google's cloud business says she doesn't expect machine intelligence to exceed that of humans during her lifetime.

2016-12-06

Power Of Nature To Enhance Internet Security

The next generation of cybersecurity is being enabled by the quantum nature of the universe itself.

2016-12-05

Snowden Loses In Norway

Edward Snowden's bid to guarantee that he would not be extradited to the US if he visited Norway has been rejected.

2016-12-05

Inside The Mind Of Cyber Criminals

There are some common misperceptions that security professionals have about cybercrime and the people who do it.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Scale Computing

Scale Computing

Scale Computing is an industry leading application platform for EDGE computing environments covering retail, manufacturing, financial services and government.

TestFort

TestFort

TestFort QA Lab is a specialized software testing company offering independent quality assurance and software testing services.

Veridify Security

Veridify Security

Veridify Security (formerly SecureRF), develops and licenses quantum-resistant, public-key security tools for the low-resource processors powering the Internet of Things.

Ahope

Ahope

Ahope is a mobile security solution provider in Korea with a long history of security solution development.

Fortra

Fortra

Fortra (formerly HelpSystems) is your cybersecurity ally, unified through the mission of providing solutions to organizations' seemingly unsolvable cybersecurity problems.

VU Security

VU Security

VU is a specialist in Cybersecurity software development with a focus on the prevention of fraud and identity theft.

Barbara IoT

Barbara IoT

Barbara is an industrial device platform specifically designed for IoT deployments.

Ingenio Global

Ingenio Global

Ingenio is a specialist recruitment business for SaaS companies. Our purpose is to source exceptional talent in areas including cyber security for leading SaaS companies in the UK and Ireland.

African Cyber Security

African Cyber Security

African Cyber Security and it's partners, have the expertise and skills to provide holistic solutions for companies, institutions and government.

SECURITI.ai

SECURITI.ai

SECURITI.ai's PrivacyOps platform is a full-stack solution that operationalizes and simplifies privacy compliance using robotic automation and a natural language interface.

UMBRA

UMBRA

UMBRA is solely concerned with protecting governments against Nation State attacks. We are not a consumer or enterprise company.

Hazy

Hazy

Hazy specialises in financial services, helping some of the world’s top banks and insurance companies reduce compliance risk.

Breadcrumb Cybersecurity

Breadcrumb Cybersecurity

Breadcrumb Cybersecurity is a cybersecurity and advisory firm. We specialize in penetration testing, threat hunting, incident response, regulatory compliance, and employee training services.

National Cybersecurity Consortium (NCC)

National Cybersecurity Consortium (NCC)

The NCC’s mandate is to keep Canada’s cyber and critical infrastructures and citizens safe while ensuring Canada’s global competitiveness and leadership in cybersecurity.

Team Secure

Team Secure

Team Secure provide Enterprise-grade Cyber Security consultancy, managed security services and cyber security staffing services.

ThreatView by Turaco Labs

ThreatView by Turaco Labs

ThreatView combines extensive experience in digital forensics with advanced analytics and threat detection capabilities to protect eCommerce websites.