News

2015-10-20

The Dark Web Uncovered

Intel Security shines a light on the shadowy world of Dark Web cybercrime markets. Far from being hidden away, these markets are easy to find.

2015-10-19

IBM's Watson Analytics - New Data Discovery

New Analytics include Expert Storybooks: data discovery models to help users discover patterns & relationships enabling predictive decisions.

2015-10-23

Cyberattack: Millions Stolen From UK Bank Accounts

Dridex: Computers become infected with the virus when users receive and open documents in seemingly legitimate emails

2015-10-18

Australia Begins Mass Data Retention

Including metadata on who called or texted whom for how long. location, volume of data exchanged, device information & email IP data.

2015-10-16

Second Snowden Has Leaked Drone Docs

There is a new large scale source of U.S. classified leaks - this time with a focus on drones.

2015-10-23

UK Crime Rate Soars as CyberCrime Included

Crime rate doubles to more than 11.6m offences due to the novel inclusion of online fraud incidents and cybercrime offences.

2015-10-15

White House Backs Off Encryption

Obama administration will not force US Tech firms to breach the security of their products in order to provide information to law enforcement.

2015-10-23

What is 'safe harbour' the EU Declared Invalid?

The European Court of Justice has ruled the data protection agreement with US invalid. Will that stop businesses from moving your EU data to America?

2015-10-21

Bitcoin - It's Uncomplicated

Bitcoin is the best known of a number of emerging online currencies. Here's a summary of what it's all about. By Jamie Collier.

2015-10-15

Malware: Banks, Customers and ATMs All Under Fire

A trio of malware threats that are designed to steal cash, online banking credentials as well as payment-card data from point-of-sale devices.

2015-10-15

Best Practices for Cybersecurity Breaches

The PCI Security Standards Council has announced new guidelines to help organizations respond to data breaches.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DXC Technology

DXC Technology

DXC Technology helps global companies run their mission critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability.

Komodo Consulting (KomodoSec)

Komodo Consulting (KomodoSec)

Komodo Consulting specializes in Penetration Testing and Red-Team Excercises, Cyber Threat Intelligence, Incident Response and Application Security.

Exonar

Exonar

We enable organisations to better organise their information, removing risk and making it more productive and secure.

Futurex

Futurex

Futurex is a globally recognized provider of enterprise-class data encryption solutions.

StrongKey

StrongKey

StrongKey (formerly StrongAuth) is a leader in Enterprise Key Management Infrastructure, bringing new levels of capability and data security at a price point significantly lower than other solutions.

Total Defense

Total Defense

Total Defense solutions include anti-malware, anti-virus, intrusion prevention & mobile security.

CyberKnight Technologies

CyberKnight Technologies

CyberKnight Technologies is a cybersecurity focused value-added-distributor (VAD) headquartered in Dubai and covering the Middle East.

Kasada

Kasada

Kasada has developed a radical approach to defeating automated cyberthreats based on its unmatched understanding of the human minds behind them.

Trusted Connectivity Alliance (TCA)

Trusted Connectivity Alliance (TCA)

Trusted Connectivity Alliance is a global, non-profit industry association which is working to enable a secure connected future.

LibraSoft

LibraSoft

Librasoft creates solutions to protect information from external and internal threats.

Noname Security

Noname Security

Noname Security detects and resolves API vulnerabilities and misconfigurations before they are exploited.

Terra Quantum

Terra Quantum

Terra Quantum is a deep tech pioneer, developing revolutionary quantum applications to shape the technology of the future.

Accenture

Accenture

Accenture is a leading global professional services company providing a range of strategy, consulting, digital, technology & operations services and solutions including cybersecurity.

Coffee Cup Solutions

Coffee Cup Solutions

We offer a full spectrum of IT Services, from our UK based Helpdesk to IT Consultancy and Cyber Security. Our team has the skills and experience to develop, deliver and manage IT for your business.

SignMyCode

SignMyCode

SignMyCode is a one-stop shop for trusted and authentic code signing solutions to safeguard software.

FutureRange

FutureRange

Specialising in IT Managed Services, Cybersecurity and Digital Transformation, FutureRange experts provide professional IT services for clients throughout Ireland and beyond.