News

2018-12-17

Insurance: Common Cyber Security Myths

We look at the myths around cyber insurance and ask the million-dollar question: can your business afford not to have it?

2018-12-13

Hackers Step Out Of The Shadows With Bigger, Bolder Attacks

Stealth and secrecy used to be the hallmarks of cyber warfare. But increasingly, cyber attacks are now carried out in full public view.

2018-12-14

Indian Government To Provide Handbook On Cyber Safety To School Children

The booklet on cyber safety for teenagers tries to address the increased use of smartphones, gadgets, online gaming and social media.

2018-12-13

Supply Chain Attacks Are On The Rise

Third-party vendors and suppliers are insiders too. They need to be included in the corporate Insider threat Program. By Marcell Gogan

2018-12-14

Top 8 Most Disturbing Data Breaches In 2018

Take a closer look at some of the major 2018 data breaches and discover why they happened. By Marcell Gogan

2018-12-11

British Telecom Is Stripping Huawei Out Of Its Network

BT is to strip all Huawei equipment from its core 4G network and prevent the Chinese equipment vendor from bidding for core 5G network contracts.

2018-12-14

Waymo Is First With Driverless Car Service

Waymo is reportedly planning to launch the world’s first commercial driverless car service this month (December 2018).

2018-12-18

Cyber Weapons Are Proliferating Beyond Control

Cybersecurity is quickly moving beyond the pure financial impact to concerns over public safety, national security and even cyberwarfare.

2018-12-12

Cybercrime Is The Biggest Evolving Source Of Crime In The UK

The capability to investigate cybercrime is one of the top challenges, particularly crime involving botnets, DDoS and malware.

2018-12-12

Germany Develops Offensive Cyber Capabilities Without A Coherent Strategy

Berlin’s latest move favoring offensive cyber activity is the creation of a cyber innovation agency, akin to the United States’ DARPA.

2018-12-12

Review Your Cybersecurity Awareness

In 2019, security teams should empower people to take more control of their own security, not only at work, but at home.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ACIS Professional Center

ACIS Professional Center

ACIS provides training and consulting services in the area of information technology, cybersecurity, IT Governance, IT Service management, information security and business continuity management.

IONU Security

IONU Security

IONU offer a security platform focused specifically on providing Data-centric Security.

Micron Technology

Micron Technology

Micron is a global leader in the semiconductor industry providing memory and secure storage devices for Networks, Mobile devices and IoT applications.

iTrinegy

iTrinegy

iTrinegy is a world leader in Application Risk Management offering solutions to mitigate all networked application deployment risks

Zen360Consult

Zen360Consult

Zen360Consult provides Advisory and Training services in the field of Cyber Resilience, which includes Cyber Security /ISMS and Business Continuity.

DarkLight

DarkLight

DarkLight is a cybersecurity platform that mimics human thinking at scale to build resiliency to Advanced Persistent Threats.

Security BSides

Security BSides

Security BSides is the first grass roots, DIY, open security conference in the world!. BSides is a community-driven framework for building events for and by information security community members.

Document Security Systems (DSS)

Document Security Systems (DSS)

DSS anti-counterfeit, authentication, and brand protection solutions are deployed to prevent attacks which threaten products, digital presence, financial instruments, and identification.

StartupXseed Ventures

StartupXseed Ventures

StartupXseed Ventures is a smart capital provider for Deep Tech, B2B, Early Stage Startups. We support, NextGen Tech Entrepreneurs, who have potential to deliver the outsized growth.

CyberCyte

CyberCyte

CyberCyte provides a disruptive built-in integrated physical, network and perimeter security solution framework.

Intersistemi Italia

Intersistemi Italia

Intersistemi is a leading Italian company in the field of information technology integration and digital transformation including cybersecurity.

NetGain Technologies

NetGain Technologies

NetGain Technologies helps small to medium-sized businesses gain access to expert IT talent. We provide strategies that use technology as a driving force behind business growth.

Foresiet

Foresiet

Foresiet is the first platform to cover all of your digital risks, allowing enterprise to focus on the core business.

Calamu

Calamu

Calamu is a software-defined storage security and resiliency platform that keeps your data secure and accessible wherever you choose to store it.

QFunction

QFunction

QFunction works within your existing security stack to detect anomalies and threats within your data.

Digital Technologies Group (DTG)

Digital Technologies Group (DTG)

DTG are a digital transformation company helping process organisations embrace smarter manufacturing through the adoption of industry 4.0 technologies and solutions.