News

2016-07-20

Ukraine Crisis Fits Cyber War Narrative

It looks like there is a direct connection between the geopolitical climate in combat torn Ukraine and the increase in cybercriminal activity.

2016-07-20

Healthcare CISOs Find Security Vendors Overpromising

Chief information security officers have enough to do trying to safeguard hospitals from an evolving array of cyber risks.

2016-07-19

Malware Targeting Energy Companies

Security researchers have discovered a new malware threat that goes to great lengths to remain undetected while targeting energy companies.

2016-07-19

A Strategic Company: The Internet of Things & How ARM Fits In

ARM Holdings designs mobile and low-power chips found in many IoT devices, the servers that connect them & the devices used to control them.

2016-07-19

UK National Crime Agency: Criminals Winning 'Cyber Arms Race'

Businesses and law enforcement agencies are losing the "cyber arms race" with online criminals.

2016-07-19

UK IP Bill Will Allow Government To Spy On Journalists

The Investigatory Powers Bill will allow the UK Intelligence services and Police to monitor and access journalist Internet, phone & data records.

2016-07-17

US and EU Implement Privacy Shield

EU promises its citizens to restore trust when their personal information is transferred to the US by multinational companies.

2016-07-18

British Royal Navy Drone Ships Will Replace Sailors

Unmanned vessels will become central to efforts in minesweeping and anti-terror missions & will eventually replace most manned ships.

2016-07-17

Dallas Shooting: US Police Robot Kills Suspect

Police’s lethal use of a bomb-disposal robot worries legal experts who say it creates gray area in use of deadly force by law enforcement.

2016-07-18

Turkish Coup: Attempt To Block Internet Fails.

Attempts at blocking or slowing access to social media networks amid an attempted military coup in Turkey have not succeeded.

2016-07-15

Experts Warn of Malicious Brexit Spam

Security experts see an increase in Brexit-themed spam designed to trick recipients into downloading malware.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Original Software

Original Software

Original Software offers a test automation solution focused completely on the goal of effective software quality management.

CionSystems

CionSystems

CionSystems provides identity, access and authentication solutions to improve security and streamline IT infrastructure management.

Second Nature Security (2NS)

Second Nature Security (2NS)

2NS provide vulnerability assessment, penetration testing, security audit, application and network security and secure software development processes.

Ikerlan

Ikerlan

Ikerlan is an R&D technology centre specialising in areas including embedded systems, industrial automation and industrial cybersecurity.

Silent Breach

Silent Breach

Silent Breach specializes in network security and digital asset protection. Services include Pentesting, Security Assessments, Incident Detection & Response, Governance Risk & Compliance.

Oak Ridge National Laboratory (ORNL)

Oak Ridge National Laboratory (ORNL)

ORNL conducts basic and applied research and development in key areas of science for energy, advanced materials, supercomputing and national security including cybersecurity.

Fyde

Fyde

Fyde helps companies with an increasingly distributed workforce mitigate breach risk by enabling secure access to critical enterprise resources.

Sovereign Intelligence

Sovereign Intelligence

Sovereign Intelligence provides automated insight into the relative intensity of hidden Cyber, Brand, and Financial Risks to your company.

Tesserent

Tesserent

Tesserent (formerly Pure Security) is a full-service cybersecurity solutions provider. We partner with clients across Australia and New Zealand in the protection of their digital assets.

Mjenzi Cloud

Mjenzi Cloud

Mjenzi Cloud is a provider of cloud IaaS solutions including managed backup services, affordable & secure cloud virtual compute/storage/compute services, bare-metal services and cloud security.

Business Resilience International Management (BRIM)

Business Resilience International Management (BRIM)

Business Resilience International Management (BRIM) is engaged by law enforcement in the UK and overseas to advise on establishing and developing Cyber Resilience Centres (CRCs) for business.

Cyber Protection Group (CPG)

Cyber Protection Group (CPG)

Cyber protection Group specialize in Penetration Testing. We work with enterprise level companies as well as small to medium sized businesses.

SecurityGen

SecurityGen

SecurityGen is a global cybersecurity start-up focused on telecom security, with a focus on 5G networks.

Plante Moran

Plante Moran

Plante Moran is a leading audit, tax, consulting, and wealth management firm. Areas of consulting expertise include cybersecurity.

Cisco Systems

Cisco Systems

Cisco helps seize the opportunities of tomorrow by proving that amazing things can happen when you connect the unconnected.

Hushmesh

Hushmesh

Hushmesh is a start-up aimed at securing the world’s digital infrastructure by developing develop the Mesh, a global information space with automated security built in.