News

2016-04-20

The Spies Of tomorrow Love Data…

Working in an age where everything is recorded and leaves a digital footprint requires different tradecraft.

2016-04-19

Deep Learning Blows Up Your Data Strategy

The implications for how you manage data are radical. Here is what you need to think about.

2016-04-17

US Cyberwar Against ISIS Begins

US Defence Secretary, Ashton Carter has issued orders to the US Cyber Command to launch online attacks against the terrorist group.

2016-04-19

Anonymous’ ‘Hack Israel Day’ Could Impact The Entire World

The operation, which generally consists of DDoS attacks, website defacement and attempts at data theft, has had some positive effects.

2016-04-11

CyberScape – The Growing Influence of Cyber (£)

Cyber issues have entered most of the areas of any organisation’s systems and often, routine working methods and communications.

2016-04-11

The Future Of Cash (£)

Cambridge University’s Cambridge Security Initiative has recently completed a report entitled Cash is King and its outline findings are laid out here.

2016-04-11

Cognitive Computing is Advancing (£)

Cognitive computing will affect all businesses in different ways even if most people at present are often unaware of its potential.

2016-04-12

Chinese Military Aim To Lead On Cyber-Space Defense

The Chinese military is forming a new Strategic Force to enhance its cyber warfare, space security & online espionage capabilities.

2016-04-11

Computer Blind Spots (£)

The majority of businesses have a number of areas of their organisation which are not analysed properly and reviewed for potential cyber breach.

2016-04-12

Ukraine - More Cyber Attacks

Consultant working for government claims energy companies ignored their own security rules in power grid hack, as more attacks are predicted to come.

2016-04-11

What Should You Do If Your Business Is Hacked? (£)

Unfortunately hacking is now part of the current culture and around 85% of businesses worldwide have been hacked in one form or many.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Riverbed Technology

Riverbed Technology

The Riverbed Network and Application Performance Platform enables organizations to visualize, optimize, accelerate and remediate the performance of any network for any application.

Ministry of Defence Georgia - Cyber Security Bureau

Ministry of Defence Georgia - Cyber Security Bureau

The aim of the Cyber Security Bureau is to establish and develop stable, effective and secure Information and Communication Technology systems for the Civil Office of MoD of Georgia.

Inspired eLearning

Inspired eLearning

Inspired eLearning deliver solutions that help clients nurture and enhance workforce skills, protect themselves against cyberattacks and regulatory violations.

Introspective Networks

Introspective Networks

Introspective Networks (IN) is a Cybersecurity company focusing on securing data in the network and automating knowledge work to decrease vulnerability points to critical infrastructure.

The Open Group

The Open Group

The Open Group: Leading the development of open, vendor-neutral IT standards and certifications.

FinlayJames

FinlayJames

FinlayJames supports cyber security companies to meet the increasing demand and pressure on them by finding top talent within the industry for their sales, marketing and technical teams.

IOTA Foundation

IOTA Foundation

The IOTA Foundation is a non-profit R&D organisation focused on developing the next generation of protocols for the connected world.

Government CSIRT - Chile

Government CSIRT - Chile

Government CSIRT is the Computer Security Incident Response Team for State networks and government cyberspace in Chile.

SOCOTEC Certification International

SOCOTEC Certification International

SOCOTEC Certification International has been providing management systems assessment and accredited ISO certification services to organisations around the world since 1995.

eCosCentric

eCosCentric

eCosCentric provides software development solutions for the IoT, M2M & embedded systems market.

Bolster

Bolster

Bolster (formerly RedMarlin) is an AI-based cyber-security platform designed to detect phishing and fraudulent sites in real-time.

Saporo

Saporo

Saporo helps organizations increase their cyber-resistance. Continuously map your attack surface and get the recommendations you need to make your organization more resistant to attacks.

inWebo

inWebo

inWebo is the specialist in multi-factor strong authentication (MFA). We guarantee the security of data and identities in a digital world with increasingly important economic and political stakes.

Armata Cyber Security

Armata Cyber Security

Armata exists to bring Cyber Security to all people – from home users and SMBs to large enterprises. We believe all users have the right to an affordable yet effective Cyber Security solution.

Ipseity Security

Ipseity Security

Ipseity Security provide security-centric advisory and consulting services for organizations to secure their perimeter-less digital transformation to meet business and security requirements.

Anjolen

Anjolen

Anjolen provides expertise in cybersecurity, compliance and cyber forensic services.