News

2017-02-21

Indian Police Training To Crackdown On Electronic Fraud

The Indian government are allocating increased capital in training police officers to crackdown on electronic fraud involving online transactions.

2017-02-21

Nation State Hacking Has A Big Commercial Impact

What impact does the long standing practice of State sponsored hacking to steal secrets and influence elections have on the business world?

2017-02-20

Is There A Truly Secure Messaging App?

More messaging apps than ever support end-to-end encryption. Should they prioritize convenience or security?

2017-02-20

Udacity Offer Deep IT Learning Programs & Nano-Degrees

Startup Udacity is using innovative methods of promoting large scale vocational IT education with focused foundation programs & 'nano degrees'.

2017-02-18

Italian Brother & Sister Cyber Spies Arrested

Two Italians stand accused of having spied on Italian politicians, state institutions, law enforcement agencies, businesses & the Vatican.

2017-02-08

Auditors Need To Know About Cyber Security

Information Security: Auditors have an obligation to educate themselves about cyber security technology if they are to do their job properly.

2017-02-18

Action Fraud: Social Media Used to Steal Charity Donations

An emerging fraud where social media platforms are used to attract donations to overseas welfare charities that do not exist.

2017-02-18

Georgia - A State Of Cybersecurity

The US state of Georgia is building a training center that’s designed to teach how to combat hacking and other forms of cyberwarfare.

2017-02-18

Old IT Networks Stop New IoT Innovation

The Internet of Things (IoT) isn’t all brand-new, cutting-edge technology. In fact, some of it’s already suffering through painful upgrade cycles.

2017-02-16

Browser Autofill Can Be Used To Steal Data

Your browser or password manager’s autofill might be giving away your information to phishers using hidden text boxes on websites.

2017-02-16

One Insurer Plans To Replace Humans With AI

A Japanese insurance company reportedly is replacing 34 workers with an artificial intelligence system. Is this the beginning of a trend?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Lloyd's

Lloyd's

As an insurance market, Lloyd’s can provide access to more than 65 expert cyber risk insurers in one place.

Securitybulls

Securitybulls

Securitybulls is an information security firm offering an encyclopedic penetration testing & IT security assessment service for your organization.

Cyfirma

Cyfirma

CYFIRMA offers Cyber threat visibility and intelligence suite and services aimed at keeping your organization’s cybersecurity posture up-to-date.

Jenson Knight

Jenson Knight

Jenson Knight is a global cyber security, cloud and IT infrastructure staffing specialist.

Dualog

Dualog

Dualog provides a maritime digital platform which ensures that services work reliably and securely onboard.

Techleap.nl

Techleap.nl

Techleap.nl is a non-profit publicly funded organisation helping to quantify and accelerate the tech ecosystem of the Netherlands.

SAIFE

SAIFE

SAIFE has adapted a Software Defined Perimeter approach and paired it with a Zero Trust model that defines access by the user, their device, and where they are located.

Littlefish

Littlefish

Littlefish provide world-class, award-winning Managed IT and Cyber Security Services, delivered from our 24/7 UK service centres.

Police CyberAlarm

Police CyberAlarm

Police CyberAlarm is a free tool to help members understand and monitor malicious cyber activity. This service is made up of two parts; monitoring and vulnerability scanning.

Advantio

Advantio

Advantio offers a unique combination of technologies and managed, advisory and testing services to increase your cyber resilience and compliance.

General Informatics

General Informatics

General Informatics is a team of technology enthusiasts with one mission: to make our clients even more successful through the best use of technology.

Celcom

Celcom

Celcom is the oldest mobile telecommunications provider in Malaysia, providing solutions and services to consumers and businesses.

RiskOptics

RiskOptics

RiskOptics (formerly Reciprocity) equips organizations with one of the most intuitive and powerful information security and cyber risk management solutions in the market.

OSC Edge

OSC Edge

OSC was founded with the vision of providing expert solutions in IT to government and businesses. OSC Edge empowers organizations with solutions that prepare them for today and tomorrow.

SequelNet

SequelNet

SequelNet is an emerging MSP, providing 360° business IT solutions and consulting services.

Screwloose IT

Screwloose IT

Screwloose IT are a national provider of information technology services. We specialise in managed IT, cloud services, cyber security, website design and digital marketing for businesses of all sizes.