News

2015-06-23

FBI Unable to Monitor ISIS’s Encrypted Communications

The FBI has warned US lawmakers there was no way to monitor encrypted online communications.

2015-06-22

Cyberwar: Enter the Trolls

The OPM breach is a case of informational smash & grab. But operations to plant misinformation are important too.

2015-06-22

Top 6 Hacking Tools Security Teams Should Know About

Black Hat or White Hat: Here are the top 6 hacking tools that every security professional ought to know about.

2015-06-22

Cyber attack on German Parliament Still Active

A cyber attack on the Bundestag is still stealing data & could force it to spend millions of euros replacing the entire IT system.

2015-06-22

The Ever-evolving Cyber Threat to Planes

Professional hackers claim airline computer systems are riddled with weaknesses that allow a breach via the in-flight entertainment system.

2015-06-22

Cyber Insurers Won’t Cover Data Breach

Insurers can decline to pay out over inadequate cybersecurity.

2015-06-22

Paying for Non-Secrets

Information contained in the hacked OPM files needs to be treated like state secrets : Opinion by Ronald Marks

2015-06-22

Samsung Will Fix Security Hole in Galaxy Smartphones

Samsung will update the security software on its Galaxy smartphones after vulnerabilities exposed.

2015-06-21

Hackers Invade Hospital Networks

Hackers penetrate secure hospital networks, collecting valuable information, by targeting medical devices.

2015-06-21

Cybersecurity in the Boardroom

NYSE Survey: The biggest risks to security are human errors.

2015-06-21

Magnitude Exploit Kit Adobe Flash Player Vulnerability

An example of how cybercriminals rapidly take advantage of recently-patched vulnerabilities through exploit kits.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT is the national Computer Emergency Response Team for the Philippines.

Cyber Akademie (CAk)

Cyber Akademie (CAk)

Cyber Akademie is a training and education center providing high-quality training and information events on information security and data protection.

Trapezoid

Trapezoid

Trapezoid is a cybersecurity company developing Firmware Integrity Management solutions designed to detect unauthorized changes to firmware & BIOS across the entire data center infrastructure.

SKOUT Secure Intelligence

SKOUT Secure Intelligence

SkOUT Secure Intelligence (formerly Oxford Solutions) provides cyber security monitoring services to organizations around the globe.

C11 Cyber Security & Digital Innovation Centre

C11 Cyber Security & Digital Innovation Centre

C11 is working with local and national partners to develop talent and bring brilliant minds and brilliant businesses together.

Cyway

Cyway

Cyway is a value-added cybersecurity distributor focusing on on-prem, cloud solutions and hybrid solutions, IoT, AI & machine learning IT security technologies.

Conference on Applied Machine Learning in Information Security (CAMLIS)

Conference on Applied Machine Learning in Information Security (CAMLIS)

CAMLIS is a venue for discussing applied research on machine learning, deep learning and data science in information security.

Trianz

Trianz

Trianz Cybersecurity Services are Powered by One of the World’s Largest Databases on Digital Transformation. We Understand Evolving Risks, Technologies and Best Practices.

SAM Seamless Network

SAM Seamless Network

SAM Seamless Network is a cybersecurity technology platform that protects the connected home, by tackling cyber security threats at the source.

8com

8com

8com is an established Managed Security Service Provider (MSSP) with over 75 employees and customers in over 40 countries.

Abacus Group

Abacus Group

Abacus Group is a global IT services firm for alternative investment firms, providing an enterprise technology platform specifically designed to meet the unique needs of financial services.

DruvStar

DruvStar

DruvStar provides B2B cybersecurity around threat management to strengthen businesses across attack vectors.

Royal United Services Institute (RUSI)

Royal United Services Institute (RUSI)

The Royal United Services Institute is an independent think tank engaged in cutting edge defence and security research. Areas of research include cyber security and resilience.

63 Moons Technologies (63MT)

63 Moons Technologies (63MT)

63 Moons Technologies is a world leader in providing next-generation technology ventures, innovations, platforms, and solutions.

Cybit

Cybit

Cybit is the one-stop-shop for digital transformation that scales in line with your growth.

Abstract Security

Abstract Security

Abstract Security has created a revolutionary platform, equipped with an AI-powered assistant, to better centralize the management of security analytics.