News

2016-02-01

Lloyd’s Insurer Says Cyber Risks Are Too Big to Cover

The head of the largest of Lloyd’s of London insurers says the potential liabilities from risks of cyber attack are too large to cover.

2016-02-01

Business Is Struggling To Combat Hacking

CISCO's 2016 Annual Security Report sheds light on the issues businesses are currently facing when it comes to cyber security.

2016-02-15

CIO Work Report - Executive Brief (£)

Studies of Chief Information Officer (CIO) employment shows that they tend to stay in a job on average for only 4 years and 4 months. Nevertheless, the likelihood of a long career often increases significantly for those CIOs that stay longer than 2 years and get engaged with their organisations.

2016-02-15

Corporations Drowning In The Data Flood (£)

All businesses have a major problem waiting for a solution but, is it something that most Boards never talk about. The storage of data, its costs and lack of use is a problem and an opportunity awaiting a solution.

2016-02-15

Proposed UK Law Requiring Business To Disclose Cyber Attacks (£)

Governments will over the next decade introduce legislation forcing businesses to firms to notify shareholders and police immediately after they have been hacked just as they would be expected to do for traditional security breaches.

2016-02-15

Board Directors' Adaption to the New Digital Revolution (£)

Boards need to discuss the level of cyber risk tolerance for various assets and threats, how cybersecurity is factored into business decisions and business relationships particularly if you use aspects of the Cloud.

2016-02-15

Board Questions To The CIO (£)

Do we analyse the markets we are in using social media data and how effective is the analysis software we are using? What results have we achieved and how is this changing the way we market and sell products and services?

2016-02-15

Cyber Questions Directors Should Ask CIOs (£)

The cyber pressure on Directors and Boards is increasing as the hack attacks increase. This process is not going to stop in the medium term and understanding of your responsibility and improving your own comprehension of the cyber risks and the digital opportunities is extremely important.

2016-01-26

Education: Introvert Personalities Go Mobile & Online

Educators are making the transition to tech-enabled discussions.

2016-01-29

Ukraine’s Power Grid Attacked By Russia

Highly destructive malware that infected at least three regional power authorities in Ukraine

2016-01-26

Ukraine Is Blaming Russian State Sponsored Hackers

The Ukrainian Government is suffering a series of power outages likely caused by cyber attacks caused by Russian hackers.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Bulb Security

Bulb Security

Whether your internal red team or penetration testing team needs training, or you lack internal resources and need an outsourced penetration test, Bulb Security can help.

Wall Street Technology Association (WSTA)

Wall Street Technology Association (WSTA)

The Wall Street Technology Association (WSTA) provides financial industry technology professionals with forums to learn from and connect with each other.

maCERT

maCERT

maCERT is the national Computer Emergency Response Team for Morocco.

Hague Security Delta (HSD)

Hague Security Delta (HSD)

The Hague Security Delta Campus is home of the leading cyber security cluster in Europe with an Innovation Centre, labs and training facilities.

Certego

Certego

Certego is a company of the VEM Sistemi Group specialised in providing managed computer security services and to combat Cyber Crime.

ISGroup (Information Security Group)

ISGroup (Information Security Group)

ISGroup services include network penetration testing, Web application penetration testing, ethical hacking, vulnerability assessments, code review and associated training.

Synelixis Solutions

Synelixis Solutions

Synelixis Solutions is a high-tech company founded to provide complete telecommunications, networking, security, control and automation solutions.

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau is the national accreditation body for Lithuania. The directory of members provides details of organisations offering certification services for ISO 27001.

Rubrik

Rubrik

Rubrik helps enterprises achieve data control to drive business resiliency, cloud mobility, and regulatory compliance.

SIXGEN

SIXGEN

SIXGEN provides incident response, operational and penetration testing, red teaming, tool development, cyber training development and continuous monitoring.

Salem Cyber

Salem Cyber

Salem Cyber builds Artificial Intelligence (AI) solutions that work collaboratively with people to address scalability challenges in cybersecurity operations.

BlastWave

BlastWave

BlastWave’s BlastShield integrates three innovative products into a single solution to help prevent inadvertent and intentional attacks.

Third Point Ventures

Third Point Ventures

Third Point brings deep technical expertise, a strong network of relationships, and decades of investing experience to add value to our partners throughout their journey from idea to IPO and beyond.

Skyhawk Security

Skyhawk Security

Skyhawk Security is the originator of Cloud threat Detection and Response (CDR), helping hundreds of users map and remediate sophisticated threats to cloud infrastructure in minutes.

AKS iQ

AKS iQ

AKS iQ leads the RegTech sector with AI, automating regulatory compliance in the banking industry and ensuring paperless TBML and CFT adherence in finance.

CliffGuard Cybersecurity

CliffGuard Cybersecurity

CliffGuard Cybersecurity deliver comprehensive services designed to protect your organization from the ever-evolving landscape of cyber threats.