FREE TO VIEW


« Back to News

2017-06-05

North Korea's Cyber War on Australia

Unit 180, the North Korean hacking team said to be behind the global WannaCry attack, has its eyes and ears on Australia.

2017-06-05

Ethical Hacking Can Beat Black Hat Hackers

Ethical Hackers: White hat hackers use the same tools and techniques as the bad guys, but they are hired by organisations to do good.

2017-06-05

The Internet of Things Will Be Even More Vulnerable to Cyber Attacks

As more smart devices become connected, the world will become more exposed to attacks like the one that hit UK’s NHS. Opinion By Hannah Bryce

2017-06-01

Microsoft Buys Cybersecurity Firm

Hexadite provides technology to automate responses to cyberattacks that it says increases productivity and reduces costs for businesses.

2017-06-02

Snowden: NSA Should Have Prevented WannaCry Attacks

The malicious WannCry software was developed by the National Security Agency and funded by American taxpayers before being leaked.

2017-06-02

Ignoring Software Updates…

Failing to update leaves your devices vulnerable to attack. Configuring automatic updates from trusted providers makes sure these are installed regularly.

2017-06-02

Eight Steps To The GDPR Countdown

GDPR will dramatically affect how businesses work with the personal data of citizens and residents of the European Union.

2017-06-02

Russian Hackers Sow Disinformation Via Leaks

Russian hackers alter documents within those releases of hacked material, planting disinformation alongside legitimate leaks.

2017-06-02

WannaCry Outbreak Is Just A Tip Of An Iceberg

While WannaCry mostly hit business and government systems, the next targets could be private homes.

2017-06-02

Mystery British Airways IT Failure

Experts have questioned British Airways’ claim that this weekend’s catastrophic IT failure was down to a “power surge”

2017-05-31

Algorithms: An Unseen Influence On The UK Election

Social media, Facebook in particular, will have an enormous effect on the UK vote, yet no-one seems to know how to measure what’s happening there.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Splunk

Splunk

Splunk provide real-time Security Information & Event Management solutions for Enterprise Networks, Cloud and small-scale IT environments

We Watch Your Website

We Watch Your Website

We Watch Your Website provide website monitoring, protection, malware removal and root cause analysis services to help you keep your website secure.

Chubb

Chubb

Chubb is the world’s largest publicly traded property and casualty insurer. Commercial services include Cyber Risk insurance.

Secure Recruiting International (SRI)

Secure Recruiting International (SRI)

SRI is an industry leader in Information Security , Networking, Wireless and Storage recruitment.

Aves Netsec

Aves Netsec

Aves is a deceptive security system for enterprises who want to capture, observe and mitigate bad actors in their internal network.

H3C Group

H3C Group

H3C provides a full range of Computer, Storage, Networking and Security solutions.

MENAInfoSecurity

MENAInfoSecurity

MENAInfoSecurity is a regional leader in information security solutions, assurance services and managed services.

Level Effect

Level Effect

Level Effect is developing new capabilities to bring a unique perspective on proactive network defense and advanced security analytics.

DFI

DFI

DFI is a global leading provider of high-performance computing technology across multiple embedded industries.

Zamna

Zamna

Zamna (formerly VChain Technology) is an award-winning software company building GDPR compliant identity platforms for the aviation industry.

National Cyber Coordination & Command Centre (NC4) - Malaysia

National Cyber Coordination & Command Centre (NC4) - Malaysia

NC4 is established as a center for dealing with cyber threats and crisis at the national level in Malaysia.

SynSaber

SynSaber

SynSaber is a data collection, detection, and visibility solution that forms the foundation of industrial cybersecurity.

Ridge Security

Ridge Security

Ridge Security enables enterprise and web application teams, ISVs, governments, education, DevOps, anyone responsible for ensuring software security to affordably and efficiently test their systems.

TokenEx

TokenEx

TokenEx Cloud Security Platform protects sensitive data to strengthen our clients' security postures while future-proofing their operations.

Darktrace

Darktrace

Darktrace is a global leader in cybersecurity AI, delivering complete AI-powered solutions in its mission to free the world of cyber disruption.

Crypto Legal

Crypto Legal

Crypto Legal is a leading UK-based law firm specialising in blockchain forensics and legal services.