News

2016-12-08

Rise Of The Machines

The Institute for Critical Infrastructure Technology (ICIT) say the Mirai Botnet attack on Dyn was just a rehearsal for an even bigger event.

2016-12-08

Next 3 Years Most Critical Of All For Technology

About 40% of CEOs think they will be running a completely different entity in the next three years.

2016-12-08

Banks Plan To Hoard Bitcoins

Big banks planning to stockpile bitcoins in order to pay off cyber criminals who threaten to bring down their critical IT systems.

2016-12-07

Just How Safe Is Online Banking?

Banking online is convenient, but how can you you protect against your accounts being emptied by fraudsters? Here is some useful advice.

2016-12-07

Yes, Russia Weaponised Social Media In The US Elections

Russia didn't just hack & leak documents from US political groups, it used social media as a weapon to influence perceptions about the election.

2016-12-07

Half The World's Population Is Not Yet On The Internet.

Room For Growth: More than half of the world's population still isn't using the Internet.

2016-12-07

What Are The Big Cyber Threats In 2017?

It looks like 2016 will be remembered as the year of the data breach and several obvious threats are likely to feature next year.

2016-12-06

AI Beating Humans? Not In My lifetime, Says Google Chief

The head of Google's cloud business says she doesn't expect machine intelligence to exceed that of humans during her lifetime.

2016-12-06

Power Of Nature To Enhance Internet Security

The next generation of cybersecurity is being enabled by the quantum nature of the universe itself.

2016-12-05

Snowden Loses In Norway

Edward Snowden's bid to guarantee that he would not be extradited to the US if he visited Norway has been rejected.

2016-12-05

Inside The Mind Of Cyber Criminals

There are some common misperceptions that security professionals have about cybercrime and the people who do it.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Exclusive Networks

Exclusive Networks

Exclusive Networks accelerate market entry and growth for innovative cybersecurity, networking and infrastructure technologies.

GigaOm

GigaOm

GigaOm's mission is to provide enterprises with information and analysis to help them make better decisions about technology.

CLUSIS

CLUSIS

CLUSIS is an association for the information security industry in Switzerland.

Nixu

Nixu

Nixu is the largest Nordic specialist company in information security consulting.

Careers in Cyber Security (CiCS)

Careers in Cyber Security (CiCS)

CareersinCyberSecurity is a leading global job board and career resource for Cyber Security, IT Audit, Technology Risk and Data Protection professionals.

SteelCloud

SteelCloud

SteelCloud has spent the last decade inventing technology to automate policy compliance, configuration control, and Cloud security.

Cyber Defense Initiative Conference (CDIC)

Cyber Defense Initiative Conference (CDIC)

Cyber Defense Initiative Conference (CDIC) is one of the most distinguished Cybersecurity, Privacy and Information Security Conference in Thailand and Southeast Asia.

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity make Cars & Infrastructures Cybersecure.

ThreatGen

ThreatGen

ThreatGEN™ works with your team to improve your resiliency and industrial cybersecurity capabilities through an innovative and modernized approach to training and services.

Red4Sec

Red4Sec

Red4Sec are experts in ethical hacking, audits of web and mobile applications, code audits, cryptocurrency audits, perimeter security and incident response.

ACET Solutions

ACET Solutions

ACET Solutions delivers a wide range of Automation, Cyber Security and Enterprise IT/OT Integration Solutions to industrial clients.

SRG Security Resource Group

SRG Security Resource Group

SRG Security Resource Group is a Canadian company dedicated to providing world-class Physical and Cyber Security services.

Washington Technology Solutions (WaTech)

Washington Technology Solutions (WaTech)

WaTech operates the state’s core technology infrastructure – the central network and data center, provides strategic direction for cybersecurity and protects state networks from growing cyber threats.

Systems Engineering

Systems Engineering

Systems Engineering is a SOC 2, Type 2-certified IT strategy and managed technology services provider.

AuthX

AuthX

AuthX provides secure and seamless log-in capabilities through strong authentication and integrations.

UltraViolet Cyber

UltraViolet Cyber

UltraViolet is an industry leading tech-enabled managed security services company.