FREE TO VIEW


« Back to News

2017-04-12

ISPs Can Tell Users About Infected Computers

ISPs can spot malicious patterns of activity over the Internet and even pinpoint the IP addresses that are being used for cybercrime.

2017-04-11

Cloudbleed Is Just The Latest Internet Security Disaster

A tiny coding bug has led to an unknown quantity of data, passwords, personal information, messages & cookies, to leak all over the Internet.

2017-04-11

Google Lawsuit Could Be Fatal For Uber

With a $70bn valuation, Uber has won victories against regulators, taxi companies and many competitors. Now they face a challenge from Google.

2017-04-10

Four Steps To Managing Cyber Security Better

Company boards have a pressing fiduciary responsibility, to promote & support development of robust cybersecurity programmes.

2017-04-10

Geolocation, Russian Hackers & False Flag Operations

Experts at ICIT say malicious actors can easily position their breach so that it can be attributed to Russian state-sponsored hackers.

2017-04-10

ENISA’s Threat Rankings: From Malware To Cyber Spies

Europe's computer security agency has set out a list of the top online threats with a warning that hacking for profit is the biggest trend.

2017-04-10

US Buys Mysterious ISIS Drone Killer

The US Air Force is trying to counter small armed drones and is testing multiple technologies and systems to counter deadly ISIS UAVs in Mosul.

2017-04-10

Trump Administration's Policy On Cybersecurity

'If you're not thinking of cyber first, I don't know what you should be thinking about.' Increased spending on surveillance & encryption.

2017-04-08

Are Employees Your Weakest Link When It Comes To Security?

Your technology could have every safety feature and yet a lack of employee education could instantly compromise all of that. By Jane Frankland

2017-04-07

London Conference: Protecting Critical Infrastructure

SGG- Global: The Cybersecurity Protecting Critical Infrastructure Conference. 16th-17th May 2017 London

2017-04-07

More Details Of Crippling Attack On UK Bank Emerge

Lloyds Bank call in the cybersecurity experts to investigate the attack which stopped a substantial number of customers using their online accounts.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Fredda Stanza

Fredda Stanza

Fredda Stanza specialize in Information Security and Forensics Consulting.

NXP Semiconductors

NXP Semiconductors

NXP is a world leader in secure connectivity solutions for embedded applications and the Internet of Things.

Verimuchme

Verimuchme

Verimuchme is a digital wallet and exchange platform to secure, verify and re-use personal information.

UL Solutions

UL Solutions

UL Solutions is a safety, security and compliance consulting and certification company. Areas covered include cyber security.

Bottomline Technologies

Bottomline Technologies

Bottomline Technologies is an innovator in business payment automation technology, helping companies make complex business payments simple, smart and secure.

STM

STM

STM provides system engineering, technical support, project management, technology transfer and logistics support services for the Turkish Armed Forces.

Trust Stamp

Trust Stamp

Trust Stamp provide Identity and Trust as a Service to answer two fundamental questions: “Who are you?” and “Do I trust you?"

Munich Re

Munich Re

Munich Re is a leading global provider of reinsurance, primary insurance and insurance-related risk solutions including Cyber.

Berkeley Varitronic Systems (BVS)

Berkeley Varitronic Systems (BVS)

Berkeley Varitronics Systems is an engineering think tank delivering custom wireless RF engineering products and solutions including cyber security.

Baxter Clewis Consulting

Baxter Clewis Consulting

Baxter Clewis are cyber security and compliance experts. We provide Security Consulting, IT Assurance, and Technical Security services.

Sentrium Security

Sentrium Security

Sentrium is committed to helping organisations protect their technology, information and people. Our range of bespoke services provide solutions to tackle a broad range of cyber security challenges.

LANCOM Systems

LANCOM Systems

LANCOM Systems is the leading European manufacturer of secure, reliable and future-proof networking (WAN, LAN, WLAN) and firewall solutions for the public and private sectors.

Infuse Technology

Infuse Technology

Infuse Technology provide the highest level of cybersecurity support, implementing practical solutions to protect against cyber-attacks, from simple phishing scams to complex data security breaches.

Josef Ressel Centre for Intelligent & Secure Industrial Automation

Josef Ressel Centre for Intelligent & Secure Industrial Automation

The Josef Ressel Centre for Intelligent and Secure Industrial Automation investigates the fundamentals of digital assistants for industrial machines that enable intelligent and secure operation.

Eqlipse Technologies

Eqlipse Technologies

Eqlipse Technologies provides products and high-end engineering solutions to customers in the Department of Defense and Intelligence Community.

360 Advanced

360 Advanced

360 Advanced is a relationship-focused cybersecurity and compliance firm offering integrated compliance solutions customized to meet your business’ needs.