News

2016-05-11

Tracking Islamic State Impeded By Encryption

Islamic State is the 'most sophisticated' user of the Internet and the available technologies to ensure end-to-end encryption.

2016-05-11

SpyEye Masterminds Begin 24 Year Sentence

SpyEye banking malware caused losses of nearly $1 billion and infected over 50 million computers. Two jailed, one still at large.

2016-05-10

Cyber "Best Practices" Are About To Change

The solution to our cyber crisis is not as difficult to understand as most people think. Opinion by Christopher Murphy

2016-05-13

Pentagon Wants to ‘Fingerprint’ The World’s Hackers

DARPA plans to track hackers to create “algorithms for developing predictive behavioral profiles,” linking malicious activity to individuals.

2016-05-10

Automated Malware Analysis Central to Defense Strategies

Research firm Forrester are hailing automated malware analysis as a big step forward in network security.

2016-05-12

No Phone Is Safe from Hackers & Spies

The illusion of privacy: Hackers only need your phone number in order to listen in on phone calls, read texts or track your geographic location.

2016-05-30

Pushing Back Sexism - A New Era For Women In Technology.

Women are challenging global technology companies and empowering themselves and each other to be safer online.

2016-05-10

CyberScape – The Growing Influence of Cyber Threats (£)

Cyber issues have entered most of the areas of any organisation’s systems and often, routine working methods and communications.

2016-05-10

Cyber Stalking: It's Real & Potentially Deadly (£)

When a “digital issue” became a real life danger.

2016-05-09

Cyber Revolution: A Big Step Change Business Leaders Need To Understand (£)

A revolution is taking place that compares to the Agricultural and the two earlier Industrial Revolutions and for many senior directors and strategic policy managers this has not yet been fully understood.

2016-05-10

Important IT Security Requirements For Business Leaders (£)

The implementation of cyber security skills and IT security departments have significantly increased in the last eighteen months and it has become an important issue that business directors and especially CEOs, Financial Directors and of course CIOs and IT Directors need to fully understand.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

KPMG

KPMG

KPMG s a leading provider of professional services including information technology and cyber security consulting.

Secusmart

Secusmart

Secusmart provide highly secure and encrypted speech and data communication solutions.

Security Brokers

Security Brokers

Security Brokers focus services and solutions with a focus on strategic ICT Security and Cyber Defense issues.

PSW Group

PSW Group

PSW Group is a full-service Internet solutions provider with a special focus on Internet security.

AdaptiveMobile Security

AdaptiveMobile Security

AdaptiveMobile Security, a world leader in mobile network security, protecting more than 2.2 billion subscribers worldwide.

Eskive

Eskive

Eskive is a Brazilian cyber security awareness and education platform that empowers users and strengthens their company in the face of cyber threats.

EU Joint Research Centre

EU Joint Research Centre

JRC is the European Commission's science and knowledge service which employs scientists to carry out research in order to provide independent scientific advice and support to EU policy.

Keyavi Data

Keyavi Data

With Keyavi’s evolutionary data protection technology, your data stays within the bounds of your control in perpetuity.

CyberSat Summit

CyberSat Summit

CyberSat is dedicated to fostering the necessary discussions to flesh out and develop solutions to cyber threats in the satellite industry.

C2SEC

C2SEC

C2Sec provides an innovative analytics platform that assesses and quantifies cyber risks in financial terms based on combining patented big data, AI, and cybersecurity technologies.

AirITSystems

AirITSystems

AirITSystems offer companies comprehensive IT security solutions that take all security considerations into account and are tailored to your business.

Airtel Secure

Airtel Secure

Airtel Secure’s multi-layered, full service cybersecurity offerings are designed to safeguard enterprises against threats of various kinds and origins.

BaXian Group

BaXian Group

BaXian AG is an international consulting company specializing in IT security, data analytics, risk management and compliance.

Wing Security

Wing Security

Wing fosters a stronger security culture by engaging SaaS end-users and enabling easy communication with security teams.

Custard Technical Services

Custard Technical Services

Custard provide Network Security for all types of businesses across many industries, helping to keep them safe and secure.

Metrics that Matter (MTM)

Metrics that Matter (MTM)

Metrics that Matter redefines how organizations approach cybersecurity by offering unprecedented insight into the value of their assets to criminals and tailored action plans to protect.