News

2015-10-19

IBM's Watson Analytics - New Data Discovery

New Analytics include Expert Storybooks: data discovery models to help users discover patterns & relationships enabling predictive decisions.

2015-10-23

Cyberattack: Millions Stolen From UK Bank Accounts

Dridex: Computers become infected with the virus when users receive and open documents in seemingly legitimate emails

2015-10-18

Australia Begins Mass Data Retention

Including metadata on who called or texted whom for how long. location, volume of data exchanged, device information & email IP data.

2015-10-16

Second Snowden Has Leaked Drone Docs

There is a new large scale source of U.S. classified leaks - this time with a focus on drones.

2015-10-23

UK Crime Rate Soars as CyberCrime Included

Crime rate doubles to more than 11.6m offences due to the novel inclusion of online fraud incidents and cybercrime offences.

2015-10-15

White House Backs Off Encryption

Obama administration will not force US Tech firms to breach the security of their products in order to provide information to law enforcement.

2015-10-23

What is 'safe harbour' the EU Declared Invalid?

The European Court of Justice has ruled the data protection agreement with US invalid. Will that stop businesses from moving your EU data to America?

2015-10-21

Bitcoin - It's Uncomplicated

Bitcoin is the best known of a number of emerging online currencies. Here's a summary of what it's all about. By Jamie Collier.

2015-10-15

Malware: Banks, Customers and ATMs All Under Fire

A trio of malware threats that are designed to steal cash, online banking credentials as well as payment-card data from point-of-sale devices.

2015-10-15

Best Practices for Cybersecurity Breaches

The PCI Security Standards Council has announced new guidelines to help organizations respond to data breaches.

2015-10-15

Blackphone: Privacy-obsessed Smartphone

Silent Circle has released a second version of its signature smartphone designed to defeat tracking and interception.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Quttera

Quttera

Quttera provides Website Security Solutions for Small & Medium Businesses, Enterprises and Organizations.

Micro Focus

Micro Focus

Micro Focus is one of the world’s largest enterprise software providers. We deliver trusted and proven mission-critical software that keeps the digital world running.

Ionic Security

Ionic Security

Ionic provide a high-assurance data protection and control platform built on strong encryption, fine-grain control and contextual analytics.

Security University

Security University

Security University is a leading provider of Qualified Hands-On Cybersecurity Education, Information Assurance Training and Certifications for IT and Security Professionals.

Matrix42

Matrix42

Matrix42 software for digital workspace experience manages devices, applications, processes and services simple, secure and compliant.

LATRO Services

LATRO Services

LATRO Services is a complete solution provider to discover, locate, and eliminate telecom fraud.

Wise-Mon

Wise-Mon

Wise-Mon is expert in its field of network monitoring and control. We give solutions to huge organizations with tens of thousands of ports, as well as small companies with one switch.

Cipher

Cipher

Founded in 2000, Cipher is a global cybersecurity company that delivers a wide range of Managed Security Services.

Dutch Institute for Vulnerability Disclosure (DIVD)

Dutch Institute for Vulnerability Disclosure (DIVD)

DIVD's aim is to make the digital world safer by reporting vulnerabilities we find in digital systems to the people who can fix them.

The Security Bulldog

The Security Bulldog

The Security Bulldog distills and assimilates open source cyber intelligence to enable security teams to understand threats more quickly, make better decisions, and accelerate detection and response.

Heron Technology

Heron Technology

Heron Technology are a technology solutions consultancy with core competencies in the areas of Cyber Security and Digital Aviation.

Data Computer Services

Data Computer Services

Data Computer Services provides professional tailored IT Support and IT Services for businesses throughout Edinburgh and the Lothians.

Xeol

Xeol

Software free of vulnerabilities, built and distributed by trusted entities. Our mission is to help customers secure their software from code to deploy.

Star Lab

Star Lab

Star Lab specializes in the development and productization of embedded security technologies.

Reco AI

Reco AI

Reco is an identity-centric SaaS security solution that empowers organizations with full visibility into every app, identity, and their actions to control risk in their SaaS ecosystem.

DOT Europe

DOT Europe

DOT Europe is a consensus based organisation which brings a diverse membership together to agree on their collective stance on EU tech policy.

Intraframe US

Intraframe US

Intraframe US is a cybersecurity company in Memphis, specializing in Digital Forensics Incident Response and Managed IT services. We provide SMBs with a 24/7 SOC for proactive Cyber Threat Management.