News

2016-07-25

Civil Liberties Group Crashes Thailand Government Website

A cyber-attack by a Thai group opposed to the “Single Gateway” brought down a major government website.

2016-07-25

Cyberwar Against Islamic State Is Struggling

The so-called "cyber bombs" that the US military is virtually dropping on Islamic State targets aren't working as well as first hoped.

2016-07-22

In The UK Cybercrime Has Overtaken Traditional Crime

In a sign of the times, cybercrime has now surpassed all other forms of UK crime according to the National Crime Agency (NCA).

2016-07-22

Artificial Brains to Protect Against Cyberattacks

Solutions that apply machine learning to artificial intelligence are the next step in cybersecurity.

2016-07-22

Improved Security For The Internet-of-Things

Inherently Insecure: Connectivity between IoT devices is often exploited, especially when it involves in-transit data encryption. What can be done?

2016-07-21

'Zero Days' - Hidden World of Cyber Warfare

Documentary: An enthralling espionage thriller about Stuxnet, complete with assassinations and an arsenal of bits and bytes.

2016-07-22

Ransomware Victims Run Into Millions

13m Americans have been targeted by ransomware, malicious software that blocks computer access until the victim pays a sum of money.

2016-07-21

Russia Claims ‘Increase in Cyberattacks by West Spies’

The Kremlin worries that its government agencies are under increasing western attack, and is concerned about skill shortages in government.

2016-07-20

Industrialisation Of Cybercrime Is Disrupting Business

Only 20% of IT decision makers in large multinational corporations are confident their organisation is fully prepared against cybercriminals.

2016-07-20

Hackers Target Thousands of GMails

Google Alert: “Government-backed hackers may be trying to steal your password,”

2016-07-20

Retail Banks Will be Dead Within A Decade

Experts say that Finаnсе will be thе most disrupted induѕtrу in thе nеxt 10 уеаrѕ. Retail banking as we know it will die.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

QinetiQ

QinetiQ

QinetiQ is one of the world's leading defence technology and security companies. Areas of activity include air, land, sea and space systems, weapons, robotics, C4ISR and cyber security.

iXsystems

iXsystems

iXsystems is a leader in Open-Source enterprise server and storage solutions including Backup & Recovery to protect critical data.

Cypress Semiconductor

Cypress Semiconductor

Cypress is a semiconductor design and manufacturing company providing embedded devices for secure IoT applications.

Kenexis

Kenexis

Kenexis is a consulting engineering firm providing services for process hazards analysis, fire and gas mapping, and industrial cybersecurity.

Security Brokers

Security Brokers

Security Brokers focus services and solutions with a focus on strategic ICT Security and Cyber Defense issues.

ElcomSoft

ElcomSoft

ElcomSoft is a global leader in computer and mobile forensics, IT security and forensic data recovery.

Intensity Analytics

Intensity Analytics

Intensity Analytics is a software firm that develops next-generation, physical user and entity behavioral authentication ("physical UEBA") security software technology.

Secure Recruitment

Secure Recruitment

Secure Recruitment is a specialist Executive Search business that focuses its efforts on attracting specific exceptional talent in Cyber Security.

Securd

Securd

Securd takes opportunities away from your cyber adversaries. Cloud-delivered zero-trust DNS firewall and web filtering protection keep your business network and remote employees safe.

Nisos

Nisos

Nisos provides unrivaled protection of your reputation and assets through the practice of Active Defense.

RB42

RB42

RB42 (formerly Nexa Technologies) provide cyber defense solutions (ComUnity, secure and encrypted messaging, detection of interception tools, etc) and cyber defense consultancy service.

TRM Labs

TRM Labs

TRM enables risk management and compliance for a global community of financial institutions, cryptocurrency businesses and government agencies.

Trustack

Trustack

Trustack services cover connectivity, infrastructure services, security, unified comms, agile working and more. Our team of consultants deliver customised solutions tailored to your needs.

Cyberleaf

Cyberleaf

Cyberleaf is simplified managed cybersecurity for MSPs, enabling top tier cyber protection for small and medium enterprise.

Nihka Technology Group

Nihka Technology Group

Nihka offers full end-to-end ICT solutions from business optimisation, data centre modernisation, cloud connection and management, and ICT security.

CarbonHelix

CarbonHelix

CarbonHelix provides cybersecurity services from US-based security operations centers that meet the highest compliance requirements.