News

2016-12-12

How Much Do IT Graduate & Intern Jobs Currently Pay?

In the Technology industry it’s hard for job seekers to know what they’re worth. It’s even harder when they’re new to the rat race.

2016-12-12

A Simple Way To Make Online Banking Safe. Really.

The City of London Police had considered asking financial regulators to make individual savers, rather than banks, liable for fraud losses.

2016-12-12

Codebreakers: Cybersecurity School At Bletchley Park

Bletchley Park is once again set to host some of the UK’s brightest minds, but this time they will be trying to protect codes, rather than break them.

2016-12-09

China's Great Wall Into Russian Cybersecurity

The Kremlin has joined forces with Chinese authorities to bring the internet and its users under greater state control.

2016-12-09

Critical Cybersecurity Protocols To Implement

Employees in the office or out and about are commonly using mobile devices, yours and theirs. Your network is vulnerable wherever they are.

2016-12-09

AI Ushers In A Whole New Era Of Hacking

Hackers won't necessarily always be human. AI promises to revolutionise cybersecurity and could one day become the go-to hacking tool.

2016-12-13

Cyber Police Stations Across India

Starting A Trend: Maharashtra in India is to become the first state in India to have a cyber police station in every district.

2016-12-14

IBM Watson Fights Real-Time Cyber Crime

IBM's Watson supercomputer is embarking on its biggest challenge yet: Preventing cybercrime in finance, healthcare and elsewhere.

2016-12-14

Behavior Analytics Tools For Cyber-Security

Behavior Analytics is the hot new proposition in enterprise cybersecurity, used to detect abnormal patterns in network data.

2016-12-14

Mastercard Hypes Artificial Intelligence

Mastercard have deployed 'Decision Intelligence' to scrutinise real time transactions. That sounds impressive - is it?

2016-12-14

Amazon Is Using AI To Transform Retail

Amazon uses machine learning, computer vision, sensors and deep learning in it's first actual shop to create what is calls the smart store.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

AlgoSec

AlgoSec

The AlgoSec platform enables the world’s most complex organizations to gain visibility, reduce risk and process changes at zero-touch across the hybrid network.

Hiscox

Hiscox

Hiscox offers cyber and data risks insurance to protect your business against the risks of holding data and using computer systems..

TZ-CERT

TZ-CERT

TZ-CERT is the National Computer Emergence Response Team of Tanzania.

AdNovum Informatik

AdNovum Informatik

AdNovum Informatik provides a full set of IT services, ranging from consulting, the conception and implementation of customized business and security solutions to maintenance and support.

Kudelski Security

Kudelski Security

Kudelski Security is an international cybersecurity company providing innovative, independent and tailored security solutions for large enterprise and public sector clients.

Recorded Future

Recorded Future

Recorded Future arms security teams with threat intelligence powered by patented machine learning to lower risk.

IdenTrust

IdenTrust

IdenTrust enables organizations to effectively manage the risks associated with identity authentication.

Zerocopter

Zerocopter

Zerocopter enables you to confidently leverage the skills of the world's most knowledgable ethical hackers to secure your applications.

AppGuard

AppGuard

AppGuard prevents breaches by blocking applications from performing inappropriate processes using our patented dynamic isolation and inheritance technologies.

In-Sec-M

In-Sec-M

In-Sec-M is a non-profit organization that brings together companies, learning and research institutions, and government actors to increase competitiveness of the Canadian cybersecurity industry.

ISARR

ISARR

The ISARR software platform - your bespoke Risk, Resilience & Security Management solution. Simple, cost effective and adaptable, now and into the future.

Netlinkz

Netlinkz

Netlinkz has developed the Virtual Secure Network (VSN) overlay technology platform, a breakthrough in connectivity security, speed, and simplicity.

ramsac

ramsac

ramsac provide secure, resilient IT management, cybersecurity, 24 hour support and IT strategy to businesses in London and the South East.

tru.ID

tru.ID

We’re tru.ID, and we're reimagining mobile authentication, one API at a time.

Network Perception

Network Perception

Network Perception proactively and continuously assures the security of critical OT assets with intuitive network segmentation verification and visualization.

Bosch Global Software Technologies (BGSW)

Bosch Global Software Technologies (BGSW)

Bosch Global Software Technologies offer an advanced innovation for AI security. The Bosch AIShield is the definite answer to safeguard your business against model extraction attacks.