News

2015-12-09

Cybersecurity Is A Big Government Problem

Constant vigilance is required to protect US government systems. Unfortunately, these same systems might not be up to the task.

2015-12-09

Insurance Tech Faces the Internet of Things Arms Race

As business intelligence and analytics technologies improve, insurers are developing strategies around easily accessible external data sources.

2015-12-10

Hacktivist group 'Anonymous' declares Dec 11 as ISIS 'trolling day'

Anonymous has declared a cyber war on ISIS under the hashtag #OpParis.

2015-12-09

Building a Narrative-Driven Security Model

Most organizations suffer from alert fatigue - they find themselves inundated with far too many alerts, each of which has too little context.

2015-12-09

Young People’s Concerns About Job Automation

It turns out many young Britons have no understanding of how this could impact their career at all.

2015-12-09

Digital Entrepreneurship

The European Commission wants to stimulate the smart use of digital technologies to create new businesses.

2015-12-08

Hackers Can Use Holes In The Internet of Things

Vulnerabilities in IOT devices such as fitness bands, smart-watches, drones and connected appliances could all be exploited by Hackers

2015-12-08

How to Spot a Fake LinkedIn Profile in 60 Seconds.

The LinkedIn social media platform is an important professional tool. It is also rife with fraud and deceit.

2015-12-09

The Current Chinese Cybercriminal Underground

Trend Micro analyses the cybercrime economy in China and finds it sophisticated and thriving more than ever.

2015-12-07

Insurance & Cyber Vulnerability - Get Your Report for 2016

Recently the growing tide of cyber attacks has begun to spawn a new awareness of the current cyber risks to business.

2015-12-07

Organisations Lack Maturity in Monitoring

Organizations need to dedicate more resources to logging and monitoring to combat the threat of cybersecurity incidents, CREST has warned in a new report.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TestingXperts

TestingXperts

TestingXperts is a specialist software QA and testing company.

OASIS Open

OASIS Open

OASIS Open is where individuals, organizations, and governments come together to solve some of the world’s biggest technical challenges through the development of open code and open standards.

Cyber Senate

Cyber Senate

Cyber Senate is dedicated to bringing Operators of Essential Services together with global subject matter experts to address the challenges of evolving cyber threats to critical infrastructure.

Beta Systems Software

Beta Systems Software

Beta Systems automate IT-based business processes, control access rights, monitor processes, secure the network and optimize the infrastructure management of corporate IT.

Cymbel

Cymbel

Cymbel provides businesses and government agencies with the tools and expertise they need to manage the most complex security and compliance challenges.

Infodas

Infodas

Infodas provides Cybersecurity and IT consulting / system integration services as well as a range of innovative Cybersecurity products to public sector and commercial clients.

IFE Digital Systems

IFE Digital Systems

IFE Digital Systems conducts research, development and consultancy in risk, safety and security related to digital systems in critical infrastructure.

BLUECYFORCE

BLUECYFORCE

BLUECYFORCE is the leading professional training and cyber defense training organization in France.

Cognyte

Cognyte

Cognyte are a market leader in security analytics software that empowers governments and enterprises with Actionable Intelligence for a safer world.

VCG Group

VCG Group

VCG provides everything you need for the design, implementation and management of data centres, cyber-secure enterprise networks, cloud and connectivity services.

DoControl

DoControl

DoControl gives organizations the automated, self-service tools they need for SaaS applications data access monitoring, orchestration, and remediation.

Cyberguardians

Cyberguardians

Cyberguardians is a team of experienced cybersecurity experts and consultants who always believe in the value and a high level of cybersecurity services to clients.

Sonet.io

Sonet.io

Sonet.io is built for IT leaders that want a great experience for their remote workers, while enhancing security and observability.

Port-IT

Port-IT

Port-IT is a leading partner in cybersecurity solutions tailored for the maritime industry.

SPIE Switzerland

SPIE Switzerland

SPIE Switzerland AG, a subsidiary of the SPIE Group, is a Swiss full-service provider of ICT, multi-technical and integral facility services.

LT Harper

LT Harper

LT Harper specialise in cyber security recruitment. We believe in providing an individualised service to our customers whether they are looking for a new opportunity or to hire talent.