News

2017-09-06

4 Ways to Simplify Your Business Data Management

Enterprise IT managers have more data to manage than ever. Is your business trying to to manage data growth without scaling the budget?

2017-09-06

'Killer Robot' Warfare Is Coming Closer.

Top robotics experts write a letter to the UN calling for a ban on the development of "killer robots" and warning of a new arms race.

2017-09-05

ISIS Video Adds More Terror In Spain

Following the murderous assaults in Barcelona ISIS have released a new video threatening Spain with more terrorist attacks.

2017-09-05

UK Deal With EU On Post-Brexit Data Sharing

The UK is negotiating a deal over data sharing with the EU in which there are no substantial regulatory changes as a result of Brexit.

2017-09-05

Russian Hackers Feel The Heat

Used to operating with impunity, Russian cyber criminals are getting worried that US prosecutions will lead to further arrests and close them down.

2017-09-04

Online Privacy Makes A GDPR Comeback

For organisations that operate outside data-protection laws, the facade of websites, social media & Google, GDPR represents an existential threat.

2017-09-02

How Worried Should We Be About a Nuclear War With North Korea?

Rhetoric from both Kim Jong-Un and Donald Trump has once again raised the spectre of nuclear war. Opinion by Patricia Lewis

2017-09-01

Tech Industry Has Written Women Out Of History

The British computing industry lost its edge when it removed women – and ultimately, the move destroyed it.

2017-08-30

Cybersecurity Rules For Autonomous Vehicles

The British Government has set out the key principles of vehicle cyber security for connected and automated vehicles in the UK.

2017-09-05

GDPR - 10 Things You Must Know –

GDPR is a very big deal for all companies who send emails to their customers or have any sort of email communication. By Matt O'Doyle

2017-08-30

Russia's US Election Hacks More Persistent Than First Thought

Voting systems across the US were far more susceptible to Russian hacking efforts during last year's presidential election than previously known

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Andrisoft

Andrisoft

Andrisoft develops WANGUARD, an anti-DDoS Software solution that monitors IP traffic using packet-based and flow-based Sensors, and protects networks

Qolcom

Qolcom

Qolcom is a leading UK based integrator of secure wireless network and mobile device management solutions.

Fenror7

Fenror7

Fenror7 lowers the TTD (Time To Detection) of hackers, malwares and APTs in enterprises and organizations from 300 days on average to 24 hrs or less.

ClearBlade

ClearBlade

ClearBlade is the Edge Computing software company enabling enterprises to rapidly engineer and run secure, real-time, scalable IoT applications.

Evanston Technology Partners (ETP)

Evanston Technology Partners (ETP)

ETP provides services and solutions to enable and transform businesses in the areas of cybersecurity, data protection, and efficient operations practices.

Expel

Expel

Expel provide transparent managed security services, 24x7 detection, response and resilience.

PurpleSynapz

PurpleSynapz

PurpleSynapz provides hyper-realistic Cyber Security Training with a modern curriculum and Cyber Range.

Center for Information Technology Policy (CITP) - Princeton University

Center for Information Technology Policy (CITP) - Princeton University

The Center for Information Technology Policy at Princeton University is a nexus of expertise in technology, engineering, public policy, and the social sciences.

Fortify 24/7

Fortify 24/7

Fortify 24×7 provides a robust portfolio of managed cybersecurity solutions to help you identify and prevent attacks.

WireGuard

WireGuard

WireGuard is a communication protocol and free and open-source software that implements encrypted virtual private networks (VPNs).

Huntr

Huntr

Huntr provides a single place for security researchers to submit vulnerabilities, to ensure the security and stability of AI/ML applications.

Turngate

Turngate

Turngate simplify security investigations so you can see employee activities and entitlements in your enterprise in seconds.

DACTA Global

DACTA Global

DACTA was established with the aim of simplifying the perception of complexity surrounding digital security challenges and solutions.

Abissi

Abissi

Abissi offer cyber intelligence, IoT security, automotive security, red teaming, application security and artificial intelligence security services, with a focus on security by design.

RST Cloud

RST Cloud

RST Cloud is a cutting-edge technology company that specialises in threat intelligence solutions for businesses of all sizes.