News

2016-01-04

BBC Websites Offline After Massive DDOS Attack

Mysterious new hacking group brought down the BBC websites for several hours in a large-scale DDOS attack.

2016-01-04

Islamic State Aims to Launch Cyberattacks on US

The Islamic State is seeking the ability to launch cyberattacks against US government and civilian targets.

2016-01-04

Apple Opens Fire In Encryption Battle

On one side, Silicon Valley, arguing that weakening encryption puts privacy at risk. On the other, security services, police and governments.

2016-01-04

NSA Helped UK Spies Find Juniper's Security Holes

GCHQ acquired the capability to covertly exploit security vulnerabilities in firewalls made by Juniper Networks, with the NSA's cooperation.

2016-01-04

US Agencies Freak Out Over Juniper Backdoor

Juniper Networks has uncovered unauthorized code in its firewall operating system, allowing attackers to get in and decrypt VPN traffic.

2016-01-02

Criminals Identify Deceased ID as Easy Target

A survey of ex-offenders found strong evidence that criminals are turning towards data-driven crimes over other options.

2016-01-02

Industrial Control Systems Vulnerable

According to ICS-CERT some advanced networks are vulnerable to remote attackers looking to intercept communications to and from devices.

2015-12-31

Common Cyber Threats You Need To Be Aware Of (£)

Whether you’re a small, medium-sized or large business, it’s time to face facts: your organization will be breached. What can you do about it?

2015-12-30

Getting Workers To 'buy-in' To Cybersecurity

Organizations should make sure their workers understand the importance of cyber security and actively take part in defending their company.

2015-12-29

US Banks Get Tough On Cybersecurity In 2016

National requirements for US banks to include multi-factor authorisation, audits, pen-tests, & exacting third-party vendor cybersecurity scrutiny.

2015-12-28

Intelligence Agencies Should Recruit Like Google

Finding good intelligence hires is difficult. Pehaps intelligence agencies should be using more unconventional methods.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CloudSigma

CloudSigma

CloudSigma, a pure-cloud IaaS provider offers flexible and innovative cloud hosting solutions for companies of all sizes both in Europe and the US.

Xcitium

Xcitium

Xcitium (formerly Comodo) is and industry leading provider of state-of-the-art endpoint protection solutions. Our Zero threat platform isolates and removes all ransomware & malware infectictions.

Nixu

Nixu

Nixu is the largest Nordic specialist company in information security consulting.

ElcomSoft

ElcomSoft

ElcomSoft is a global leader in computer and mobile forensics, IT security and forensic data recovery.

OnSystem Logic

OnSystem Logic

OnSystem Logic has developed a unique, patent-pending solution to solve the problem of the exploitation of flaws in application software as a technique for cyber attacks.

NSIDE Attack Logic

NSIDE Attack Logic

NSIDE Attack Logic simulates real-world cyber attacks to detect vulnerabilities in corporate networks and systems.

InnoValor

InnoValor

InnoValor realises value from digital innovation for organisations and government. We provide advisory services and develop innovative software solutions, based on our background in research.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TechStak

TechStak

TechStak is the easiest way for businesses to find and connect with IT Pros and other technology solution providers in their area.

iSolutions

iSolutions

iSolutions is an official reseller and engineering company of leading products and solutions for cybersecurity and information protection, optimization, visualization and control of applications

Red Sky Alliance

Red Sky Alliance

Red Sky Alliance (Wapack Labs Corp) is a cyber threat intelligence firm that delivers proprietary intelligence data, analysis and in-depth strategic reporting.

Utimaco

Utimaco

UTIMACO develops on-premises and cloud-based hardware security modules, solutions for key management, data protection and identity management as well as data intelligence solutions.

WireGuard

WireGuard

WireGuard is a communication protocol and free and open-source software that implements encrypted virtual private networks (VPNs).

Barclay Simpson

Barclay Simpson

Barclay Simpson is proud to have a long history of delivering cyber security, technology and governance recruitment services.

Custom Computer Specialist (CCS)

Custom Computer Specialist (CCS)

CCS offers an extensive range of services including cybersecurity solutions, consulting, implementation, and support to help our clients maximize the value derived from IT investments.

FOSSA

FOSSA

FOSSA is a leading SBOM (software bill of materials) and software supply chain risk management platform.