News

2018-01-30

Cyber Attacks Rank Alongside Natural Disasters

A big cyber attack could cost as much as a major hurricane and like extreme weather and other natural disasters, cyber attacks are a global issue.

2018-01-31

You Probably Don’t Know All the Ways Facebook Tracks You

When you sign up with Facebook you become their product. You might not realise just how deep or extensive their tracking of your behaviour goes.

2018-01-31

Facebook Names IBM Watson Executive AI Chief

Facebook brings in an experienced ex-IBM manager to navigate the company’s broadening ambitions for how AI can shape its products.

2018-02-02

AI Will Create More Jobs Than It Eliminates

The impact on jobs from AI will take a positive turn by 2020, and will reach two million net new jobs in 2025, according to Gartner.

2018-02-01

The Role Of Blockchain In Helping Organisations Meet GDPR Compliance

Blockchain and the GDPR are two of the data management industry’s hottest buzzwords and they have more than just buzz in common.

2018-02-05

Iran Adopts Russian Style CyberWar Tactics

The Iranian regime has deployed cyber trolls and online bots to push back against online dissent and influence social media trends.

2018-02-05

Ethical Hacking Is A Great Career Option

Ethical hackers are the most sought after professionals in the tech world. Perhaps you should consider hacking as a career option in 2018.

2018-02-05

Leaving Hacks Behind - Cybersecurity Predictions for 2018

Over 40 of the worst breaches ever happened in 2017. Organisations must become more proactive about identifying & preventing cyber threats in 2018.

2018-01-31

Cybercrime: £130bn Stolen From Consumers In 2017

Hackers stole a total of £130bn from consumers in 2017, including £4.6bn from British Internet users, according to cybersecurity experts at Norton.

2018-02-01

The World Needs More Computing Power

Microsoft's CEO says the world is rapidly "running out of computing capacity" and is calling for advances in superfast quantum machines.

2018-02-01

The ‘Complete’ History of 'Fake News'

How did the term "fake news" evolve, and what's next in the world of disinformation?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Ubisecure

Ubisecure

Ubisecure provide Identity & Access Management solutions.

Gate 15

Gate 15

Gate 15 provide risk management services focusing primarily on information, intelligence and threat analysis, operational support and preparedness.

Mondo

Mondo

Mondo is the largest national staffing agency specializing exclusively in high-end, niche IT, Tech, and Digital Marketing talent. Areas of expertise include Cybersecurity.

CyberSift

CyberSift

CyberSift is a cyber security provider. We develop threat detection software which needs no infrastructure changes as it integrates with almost any security tool.

Subgraph

Subgraph

Subgraph is an open source security company, committed to making secure and usable open source computing available to everyone.

Global EPIC

Global EPIC

Global EPIC is an international cybersecurity initiative designed to combat growing world challenges by facilitating global collaboration in the field of cyber security.

Orchestra Group

Orchestra Group

Orchestra Group offer a unique integrated cybersecurity defense platform with proactive security policy management and enforcement orchestration.

Redwall Technologies

Redwall Technologies

Redwall provides cybersecurity expertise and technology to prevent and respond to emerging threats against mobile applications and connected infrastructures.

ControlMap

ControlMap

ControlMap is a software as a service platform with a mission to simplify and eliminate stress from everyday operations of modern IT compliance teams.

UST

UST

UST is a global provider of digital technology and transformation, IT services and solutions including managed security services.

comforte AG

comforte AG

comforte AG is a leading provider of data-centric security technology. Organizations worldwide rely on our tokenization and format-preserving encryption capabilities to secure personal, sensitive data

Noetic Cyber

Noetic Cyber

Noetic provides a proactive approach to cyber asset and controls management, empowering security teams to see, understand, and optimize their cybersecurity posture.

Cyberwatch Finland

Cyberwatch Finland

Cyberwatch Finland's services improve decision-makers’ strategic situational picture and enable successful holistic cyber risk management.

Securious

Securious

If you need to improve your cyber security or achieve cyber security accreditations, Securious provide an independent service that will identify and address your issues quickly and efficiently.

Mutare

Mutare

For three decades, Mutare has been empowering organizations to re-imagine a better way to connect through our transformative voice security, digital voice and text messaging solutions.

WaveLink

WaveLink

WaveLink offers low risk, results-oriented Engineering Services and best-of-class Technical Support Services. Areas of expertise include cyber and security engineering.

AmiViz

AmiViz

AmiViz is the first B2B enterprise marketplace focussed on Cybersecurity business in the Middle East and Africa, designed specially to serve the interests of enterprise resellers and vendors.