News

2019-04-09

FBI Takes Too Long To Alert Victims

Auditors report that FBI agents often drag their feet in notifying victims they’ve been breached, leaving networks unnecessarily vulnerable.

2019-07-14

Cyber Knowledge The Easy Way

A new book by acclaimed cyber security expert Alfred Rolington explores the 4th Industrial Revolution, its impact on society and the economy.

2019-04-08

Financial Apps Are Vulnerable

New research reveals widespread security deficiencies indicating that financial institutions are failing when it comes to protecting their apps.

2019-04-08

The Brexit Shaped Gap In UK Cyber Security

Leaving the EU could mean a whole new cyber security regime for the UK and firms need to understand how the changes might affect them.

2019-04-08

British Politicians Need To Better Understand Cyber Security

As critical public services like transport, energy, and our election process are being digitised, cybersecurity is becoming entwined in politics.

2019-04-05

The UK Needs Data Driven Policing

Electronic social change is putting significant pressure on policing. As criminals go digital, hard-pressed police forces need to follow them.

2019-04-04

Identity Management Fundamentals

Identity management is fundamental to information security. Why is it that so many organizations are terrible at it? By Evan Francen

2019-04-08

The EU’s Copyright Directive Risks Creating Two Internets

The EU Parliament’s approval of the Copyright Directive creates substantial new controls on what can be shared online. That's a problem.

2019-04-03

Five Tech Trends Driving Cyber Security

Cybersecurity is an area where the best interests of business, customers and government need to align. A leading CISO identifies the key issues.

2019-04-03

British Cyber Security Strategy Is ‘Chaotic’

With cyber security responsibilities spread across six different departments, the UK government is coming in for biting criticism from its opponents.

2019-04-03

AI Is The New Route For Both Cyber Attacks And Their Prevention

AI is developing quickly and can be applied to several specific uses in cyber security. How useful is the technology and where can it be applied?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

FDM Group

FDM Group

FDM Group is an international Professional services company with a focus on IT. Services offered include Software Testing, and Information Security with a focus on operational security and compliance.

BaseN

BaseN

BaseN is a full stack IoT Operator. We control the full value chain in order to provide ultimate scalability, fault tolerance and security to our customers.

VigiTrust

VigiTrust

VigiTrust is a security firm specializing in cloud based eLearning programs, security compliance portals and providing security assessments.

G DATA CyberDefense

G DATA CyberDefense

G Data developed the world's first antivirus software. We now ensure the security of small, large and medium-sized companies all over the world.

NLnet Labs

NLnet Labs

NLnet Labs is a not-for-profit foundation with a long heritage in research and development, Internet architecture and governance, as well as security in the area of DNS and inter-domain routing.

Tempest

Tempest

TEMPEST is a leading provider of IT products and services including solutions for network and application security.

Digital Fingerprints

Digital Fingerprints

Digital Fingerprints provides continuous authentication with behavioural biometrics. Protection against account takeover and session takeover. Compliant with GDPR and PSD2.

Axxum Technologies

Axxum Technologies

Axxum Technologies is a premier provider of Network Communications and Information Technology Security Solutions.

Penten

Penten

Penten is an Australian-based cyber security company focused on innovation in secure mobility and applied AI (artificial intelligence).

Robert Walters

Robert Walters

Robert Walters is one of the world's leading global specialist professional recruitment and recruitment process outsourcing consultancies.

NexGenT

NexGenT

NexGenT have combined military-style training with decades of network engineering and cyber security experience into an immersive program to get people into cyber security fast and effectively.

Seal Security

Seal Security

Seal Security revolutionizes software supply chain security operations, empowering organizations to automate and scale their open source vulnerability remediation and patch management.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Seven AI

Seven AI

Seven AI develops cyber security software designed to identify online threats.

PlanNet 21 Communications

PlanNet 21 Communications

PlanNet 21 Communications is Ireland most specialised technology solution provider.

CoinCover

CoinCover

Blockchain technology is changing everything. However, it brings its own set of unique risks. Coincover ensures everyone is protected, enabling them to innovate freely, without constraints.