News

2016-11-04

Healthcare Industry Lacks Basic Security Knowhow

Levels of security awareness in Healthcare are lower than average and this sector is particularly vulnerable to social engineering style attacks.

2016-11-04

New IoT Chips See, Think & Act Autonomously

The new generation of chips powering the Internet of Things have some quite remarkable capabilities.

2016-11-04

How Did WikiLeaks Get Clinton's Emails?

Julian Assange strongly denies US accusations that Russia is the source of the flood of hacked secret political emails released by Wikileaks.

2016-11-02

No Need To Shoot Down Drones – Just Hijack Them

It's possible to hijack a wide variety of radio- controlled aircraft and other devices that use a popular wireless transmission technology.

2016-11-02

US Banking Regulator Suffers A Major Breach of Confidential Data

Careless Or Malicious? Retired employee departs with sensitive information on a portable device that has now gone missing.

2016-11-02

More Insecure Email: Clinton Camp Blasts FBI Director

FBI Director James Comey has made a controversial decision to release new details of its investigation into Hillary Clinton’s private email server.

2016-11-02

MI5 Head: Russia A Growing Threat To UK

MI5 says Russia poses an increasing threat to the stability of the UK and is using all the sophisticated tools at its disposal to achieve its aim.

2016-11-01

GCHQ’s Cyber Insiders Summer School

How to be a Cyber Spy: Learn from 'world-class experts’ in a ‘cooperative’ and ‘relaxed’ environment in a state-of the- art facility in Cheltenham.

2016-11-01

Shadow Brokers Release Secret List Of NSA-Compromised Servers

The Shadow Brokers hacking group who claimed to have leaked a portion of the NSA’s hacking tools and exploits is back with a Bang.

2016-11-01

UK To Increase National Cyber Defences

Britain invests £1.9 billion in a new strategy to protect national infrastructure with stronger cyber defences and to strike back when attacked.

2016-11-03

Google AI Invents Its Own Cryptographic Algorithm

Google Brain has created two artificial intelligences that evolved their own cryptographic algorithm to protect themselves from a third AI.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Hitachi ID Systems

Hitachi ID Systems

Hitachi ID Systems offers comprehensive identity management and access governance, privileged access management and password management solutions.

Libraesva

Libraesva

Libraesva specialize in Email Security. From Email Security, Phishing Awareness and Email Archiver. We can assist you with any email issues you may have.

exceet Secure Solutions

exceet Secure Solutions

exceet Secure Solutions is your experienced specialist for Internet of Things (IoT), Heath Telematics, electronic signatures and timestamps and IT security.

Infosistem

Infosistem

Infosistem is a Croatian ICT company with extensive expertise and experience in enterprise and SMB ICT projects and solutions.

Checksum Consultancy

Checksum Consultancy

Checksum Consultancy specializes in Information security, Risk management, and IT governance.

Cervello

Cervello

Cervello is a leading provider of comprehensive and proven solutions to protect railways against cyber attacks.

BotRx

BotRx

BotRx is the only AI-enabled, automated fraud protection technology that allows fast & easy deployment - continually keeping invisible bad bots and agents at bay, so you can rest easy.

Cyber Polygon

Cyber Polygon

Cyber Polygon is an annual online exercise which connects various global organisations to train their competencies and exchange best practices.

AlertFusion

AlertFusion

AlertFusion is a platform that makes security operations more effective. It complements existing tools and technologies, unifies operations, enhances process maturity and drives efficiencies.

Mjenzi Cloud

Mjenzi Cloud

Mjenzi Cloud is a provider of cloud IaaS solutions including managed backup services, affordable & secure cloud virtual compute/storage/compute services, bare-metal services and cloud security.

Bloc Ventures

Bloc Ventures

Bloc Ventures is an investment company providing long-term, ‘patient’ equity capital to early stage unquoted deep technology companies.

Drawbridge

Drawbridge

Drawbridge is a premier provider of cybersecurity software and solutions to the alternative investment industry.

Core to Cloud

Core to Cloud

Core to Cloud provide consultancy and technical support for the planning and implementation of sustainable security strategies.

Xact IT Solutions

Xact IT Solutions

Xact IT Solutions are a certified cybersecurity firm offering cybersecurity, compliance and managed services.

Vault Cloud

Vault Cloud

Vault Cloud, Australia's National Cloud, is an Australian owned and operated company specialising in secure, sovereign, hyperscale cloud infrastructure.

OmniIndex

OmniIndex

OmniIndex PostgresBC is the only commercial solution allowing you to keep your most sensitive and critical data encrypted while analyzing it. Structured and unstructured.