News

2016-11-01

GCHQ’s Cyber Insiders Summer School

How to be a Cyber Spy: Learn from 'world-class experts’ in a ‘cooperative’ and ‘relaxed’ environment in a state-of the- art facility in Cheltenham.

2016-11-01

Shadow Brokers Release Secret List Of NSA-Compromised Servers

The Shadow Brokers hacking group who claimed to have leaked a portion of the NSA’s hacking tools and exploits is back with a Bang.

2016-11-01

UK To Increase National Cyber Defences

Britain invests £1.9 billion in a new strategy to protect national infrastructure with stronger cyber defences and to strike back when attacked.

2016-11-03

Google AI Invents Its Own Cryptographic Algorithm

Google Brain has created two artificial intelligences that evolved their own cryptographic algorithm to protect themselves from a third AI.

2016-11-05

WhatsApp U-turn On Privacy Gets EU Challenge

EU Data Protection rules will be tested by WhatsApp's U Turn on sharing user data with Facebook.

2016-10-31

‘How The Russians Won An American Election’ Opinion By Ronald Marks

Americans are a people who pride themselves on divided government, openness, and the exposure of corruption, almost to the point of obsession.

2016-11-07

North vs. South: Cyber Warfare In Korea Is Escalating

N. Korean government entities spearheading propaganda efforts are operating task forces to post comments on Internet portals in S. Korea.

2016-11-04

Hackers Target All The Major UK Banks

A new active Angler phishing campaign has been identified by security researchers, which is targeting all major UK banks and their customers.

2016-10-31

Cost of Data Breaches Will Keep On Getting Higher

Cyberattacks are a fact of business life and it is no longer a question of if you get attacked, but instead when will you be compromised.

2016-11-09

Healthcare Suffers From A Lack Of Security Awareness

Healthcare organisations have suffered 22 major data breaches in the past year, resulting in the exposure of millions of patients' information.

2016-11-09

Find The Hacker With Action Security Intelligence

Developing actionable security intelligence requires gathering multiple insights regarding the identity, methods & motivation of the attacker.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

My Data Recovery Lab

My Data Recovery Lab

We recover data from: HDDs, RAIDs, NAS, SSDs, USB Flash Devices, Desktop Computers, Mobile devices and other data storage media.

Cyber, Space, & Intelligence Association (CSIA)

Cyber, Space, & Intelligence Association (CSIA)

CSIA focuses on issues critical to Cyber Security, Military Space and Intelligence.

RiskIQ

RiskIQ

RiskIQ is the leader in digital threat management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence.

Zettaset

Zettaset

Zettaset’s XCrypt Data Encryption Platform delivers proven protection for Object, Relational/SQL, NoSQL, and Hadoop data stores…in the cloud and on-premises.

Inseego

Inseego

Inseego provides Enterprise SaaS solutions and IoT & Mobile solutions, which together form the backbone of intelligent, reliable and secure IoT services with deep business intelligence.

ReliaQuest

ReliaQuest

ReliaQuest’s GreyMatter solution connects existing technology, people, and process – then equips security teams with unified, actionable insights across their entire environment.

NSA Career Development Programs

NSA Career Development Programs

NSA offers entry-level programs to help employees enhance their skills, improve their understanding of a specific discipline and even cross-train into a new career field.

Phoenix Cybersecurity

Phoenix Cybersecurity

Phoenix Cybersecurity Services and Managed Security Services help clients just like you take full advantage of leading cybersecurity technologies and industry best practices.

Cutting Edge Technologies (CE Tech)

Cutting Edge Technologies (CE Tech)

CE Tech is a Next Generation Technology Partner providing advanced technology infrastructure solutions through partnerships with leading technology providers.

ITTAS

ITTAS

ITTAS is a multidisciplinary company specializing in information security and software and hardware protection software.

Luxembourg House of Financial Technology (LHoFT)

Luxembourg House of Financial Technology (LHoFT)

Offering start-up incubation, co-working spaces including a soft-landing platform, the LHoFT connects and creates value for the entire Luxembourg FinTech ecosystem.

Cyera

Cyera

Cyera is the data security company that gives businesses context and control over their most valuable asset: data.

Zama

Zama

Zama - pioneering homomorphic encryption. We believe people shouldn't care about privacy. Not because it doesn't matter, but because it shouldn't be an issue!

WillJam Ventures

WillJam Ventures

WillJam Ventures are a private equity firm focused on investing in world-class cybersecurity companies that will become the next generation of leaders in protecting the world’s digital assets.

Knostic

Knostic

Knostic is an early stage startup developing a risk management and governance platform designed for enterprise large language models (LLM).

DACTA Global

DACTA Global

DACTA was established with the aim of simplifying the perception of complexity surrounding digital security challenges and solutions.