News

2016-07-27

Cyber Security is Now Business Critical (£)

Whatever their sector or size cybersecurity is now critical for any organisation.

2016-07-27

Cyber-Attack Takes Down Pokémon Go

Hacking group going by the name of PoodleCorp has claimed responsibility for a massive DDoS attack which brought down Pokémon Go.

2016-07-27

The Future Of Big Data Science

Apache Spark: An open source tool is opening up big possibilities for Data Science

2016-07-28

Google Wants Your Medical Records

Google's DeepMind has moved on from playing Go to more serious matters - attempting to solve some of the world's biggest health problems.

2016-07-27

US Defense Intelligence Agency Is Researching Employee Social Media Histories

The Pentagon is researching a "social media checks" pilot scheme that would analyze public posts to help determine an employee's suitability.

2016-07-27

Ransomware: Should You Pay The Ransom?

Security professionals dread the day when they learn that ransomware has infiltrated their network and started encrypting files & drives.

2016-07-26

US Carmakers Want Hackers To Help Them Improve Cybesecurity

Today's automobile is rapidly becoming a computer on wheels, with more micro-processing power than can be found in a typical home or office.

2016-07-26

Snowden iPhone Case Alerts Users To Surveillance

Edward Snowden has helped design a mobile phone case that shows when a smartphone is transmitting information that could be monitored.

2016-07-26

US Cyber Mission Force Nearly Ready for Action

The new cyber force will eventually contain over 6000 operatives split into 133 groups, with both offensive and defensive missions.

2016-07-26

Cloud Video Architecture Improves Emergency Services Response

Visual data can be critical in knowing where to send emergency services personnel, tracking suspects, or detecting hazardous materials.

2016-07-25

Cybersecurity: The Human Dynamic

Ultimately, cyber security is governed by choices made by a human sat at a keyboard.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Backup112

Backup112

Backup112 has been delivering professional cloud backup services since 2004.

Fortra

Fortra

Fortra (formerly HelpSystems) is your cybersecurity ally, unified through the mission of providing solutions to organizations' seemingly unsolvable cybersecurity problems.

BrainChip

BrainChip

BrainChip is the leading provider of neuromorphic computing solutions, a type of artificial intelligence that is inspired by the biology of the human neuron - spiking neural networks.

Endian

Endian

Endian’s mission is to provide a secure platform that connects distributed people and things, simplifying the digitalization of businesses.

Fraud.com

Fraud.com

Fraud.com ensures trust at every step of the customer's digital journey; this complete end-to-end protection delivers unified identity, authentication and fraud detection and prevention.

Pipeline Security

Pipeline Security

Pipeline is a leader in cybersecurity, offering comprehensive services to protect organizations from evolving threats.

DestructData

DestructData

DestructData is a leading independent provider of End of Life data destruction/security solutions.

ICS Cyber Security Conference

ICS Cyber Security Conference

SecurityWeek’s Industrial Control Systems (ICS) Cyber Security Conference is the largest and longest-running event series focused on industrial cybersecurity.

Blockchain Research Institute (BRI)

Blockchain Research Institute (BRI)

Blockchain Research Institute (BRI) is an independent, global think-tank. We bring together the world’s top global researchers to undertake ground-breaking research on blockchain technology.

Cyber Security Cloud (CSC)

Cyber Security Cloud (CSC)

Cyber Security Cloud provides web application security services worldwide using world's leading cyber threat intelligence and AI technology.

Raqmiyat

Raqmiyat

Raqmiyat provides end-to-end IT Services and business solutions including consultancy, digital transformation, infrastructure and cybersecurity.

Polaris Infosec

Polaris Infosec

Polaris Web Presence Protection (WPP) is powered by our proprietary artificial intelligence and machine learning engine to ensure that attacks are stopped before they affect your business.

Stratum Security

Stratum Security

Stratum Security is an information security consulting company that focuses on providing clear and concise risk guidance to its clients through high quality assessment services.

Institute for Security and Technology (IST)

Institute for Security and Technology (IST)

The Institute for Security and Technology's goal is to provide the tools and insights needed for companies and governments to outpace emerging global security threats.

SecurelyShare Software

SecurelyShare Software

SecurelyShare Software is a security software company, specializing in data security, data privacy and data governance.

Conosco

Conosco

Conosco are industry-leading experts throughout the UK in strategic consulting, project delivery, business communications, support, and security.