News

2016-11-14

Cyber Attack Takes Liberia’s Entire Internet Down

A cyber-attack knocked Liberia’s Internet offline, as hackers targeted the nation’s infrastructure using a mass DDOS technique.

2016-11-15

Jason Bourne: Envisioning A ‘frightening’ Cyberwar

Fact Or Fiction: Bourne's author “extrapolating” from his new thriller a “frightening” scenario of cyberwarfare that could inflict the real world.

2016-11-14

Company Directors Should Have Personal Liability For Data Breaches

The UK's Information Commissioner recommends government should hold company directors personally accountable for for data breaches.

2016-11-18

Self-drive Vehicles – A New Reality

There’s a powerful force behind the development of autonomous-vehicle technology. Armies around the world.

2016-11-18

Inside Anonymous - ‘Civil War’ Over Its Fight With ISIS

Hacktivist collective Anonymous cannot agree on strategy or tactics in it's self-appointed task of tackling IS Cyber Jihad.

2016-11-19

Nude Celebrity Photo Hacker Jailed

“Celebgate” perpetrator who hacked the Apple iCloud would have been foiled by two-step authentication.

2016-11-10

Cybercrime in Canada

Cybercrime is top of mind for many Canadian small and medium-sized businesses (SMBs).

2016-11-18

Bitcoin Just Isn’t Anonymous Enough

The anonymity of bitcoin has gained it many criminal users. Now, though, it's looking like the digital currency isn’t quite anonymous enough.

2016-11-10

US launches Code.gov Software Code-sharing Website

Code.gov, is a US government website for promoting the sharing of custom-developed software code.

2016-11-22

Artificial Intelligence: AI Fact & Fiction

Artificial intelligence is the science of making smart machines and it has come a long way since the term was coined in the 1950s. Good or bad?

2016-11-30

US Cybersecurity Strategy In The Trump Era

The Trump Administration has an opportunity to update US national security policies. What might they do differently for cybersecurity?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

European Council on Foreign Relations (ECFR)

European Council on Foreign Relations (ECFR)

ECFR is a pan-European think-tank conducting research and promote informed debate on European foreign policy. Cyber security is becoming an intrinsic element of foreign policy debate.

EY Advisory

EY Advisory

EY is a multinational professional services firm headquartered in the UK. EY Advisory service areas include Cybersecurity.

Smoothwall

Smoothwall

Smoothwall develop intelligent web filtering, Monitoring and security solutions designed to protect users worldwide.

Payatu

Payatu

Payatu Technologies is a security testing and services company specialized in Software, Application and Infrastructure security assessments and deep technical security training.

Aujas Cybersecurity

Aujas Cybersecurity

Aujas has deep expertise and capabilities in Identity and Access Management, Risk Advisory, Security Verification, Security Engineering, & Managed Detection and Response services.

Ravelin Technology

Ravelin Technology

Ravelin prevents chargebacks, fraud, and account takeover. Machine learning and human insight combine for highly accurate fraud detection and prevention.

Zeguro

Zeguro

Zeguro provides complete cybersecurity risk assessment, mitigation and insurance, allowing you to easily manage your cyber risk.

iProov

iProov

iProov delivers authentication and verification simply and securely, based on a genuine one-time biometric.

Charterhouse Müller UK

Charterhouse Müller UK

Charterhouse Müller UK are a leading service provider for end of life IT services including data erasure and secure IT asset disposal.

Omnipotech

Omnipotech

Omnipotech is a complete managed service provider. From desktop to datacenter, all the technology support you need, under one umbrella.

Bionic

Bionic

Bionic is an agentless way to get control over your increasingly complex applications so you can manage, operate, and secure them faster and more efficiently.

Robo Shadow

Robo Shadow

Robo Shadow are trying to bridge the gap between the top tier organisations that can afford everything and everyone else who has to “Make it up as they go along” when it comes to Cyber.

Alea Consulting

Alea Consulting

Alea Consulting is a global risk mitigation and investigative consulting firm, which helps organizations reduce reputation and operational concerns.

Rimini Street

Rimini Street

Rimini Street is a global provider of enterprise software support products and services, and the leading third-party support provider for Oracle and SAP software products.

BluSapphire

BluSapphire

BluSapphire is an industry-first, purpose-built, cloud-native, Hybrid XDR platform powered by AI and big data analytics.

BreachBits

BreachBits

BreachBits are on a mission to deliver world-class cyber risk insights continuously at scale in situations where knowing the true risk truly matters.