News

2021-07-22

Politicians Are Ignorant Of Cyber Security

Britain has very high cyber security skills and its spy agencies have great technical expertise, but its political leaders are not up to speed.

2021-07-21

Russian National Security Strategy

The new strategy aims to promote Russian digital sovereignty and to counter the threat of foreign and domestic subversion with information warfare.

2021-07-20

Artificial Intelligence Is Being Badly Used In Cyber Security

With many more enterprises using AI technology, it’s time to analyse the possible negative impacts of AI's implementation in cyber security.

2021-07-20

SMEs Need To Close The Cyber Security Training Gap

Companies are struggling to get employees to take security measures for remote working and cannot hire the skilled people to put security in place.

2021-07-19

Scientists Say Social Media Is A Risk To Humanity

Social media has completely changed the way we communicate and the collective behavioral effects of new technology on humans can be destructive.

2021-07-19

Ransomware Gang REvil Is Cancelled

The strange disappearance of the public-facing websites affiliated with Russia-linked REvil follows shortly after a string of big ransomware incidents.

2021-07-19

Autonomous Ships And Cyber Security

Maritime Autonomy: Unmanned surface ships are becoming more independent and capable of accomplishing sophisticated missions.

2021-07-19

IISS: Cyber Capabilities & National Power Rankings

Cyber capability underpins military power and can radically affect national decision-making. Currently the US has superiority over numerous contenders.

2021-07-17

For Sale - Dark Web Exploits

Older exploits are cheaper and remain useful to cyber criminals for longer. Its just as important to update and patch for these as for Zero-Days.

2021-07-16

Microsoft Buys RiskIQ

RiskIQ offers threat intelligence & cloud-based software used by 30% of the Fortune 500 and more than 6,000 organisations around the world.

2021-07-16

How B2B Companies Can Use Cyber Security For Data Protection

For optimum data protection, actionable intelligence needs to be followed up with robust cyber security solutions. By Lidia Hovhan

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

SonicWall

SonicWall

SonicWall provide products for network security, access security, email security & encryption.

Clearwater Security & Compliance

Clearwater Security & Compliance

Clearwater Compliance specialize in Privacy, Security, Compliance and Risk Management Solutions for Health Care, Law Firms and other businesses.

UL Solutions

UL Solutions

UL Solutions is a safety, security and compliance consulting and certification company. Areas covered include cyber security.

HYAS Infosec

HYAS Infosec

HYAS is a highly skilled information security firm developing the next generation of information security technology.

Get Safe Online

Get Safe Online

Get Safe Online is a leading source of unbiased, factual and easy-to-understand information on online safety.

Green House Data

Green House Data

Green House Data is a managed services provider delivering hybrid solutions to enterprises who need secure IT environments and efficient management of their critical applications and business data.

Point Predictive

Point Predictive

Point Predictive build Predictive Models using Artificial Intelligence and Machine Learning techniques that help our customers stop fraud and early payment default (EPD).

WolfSSL

WolfSSL

wolfSSL is an embedded SSL/TLS library providing secure communication for IoT, smart grid, connected home, routers, applications, games, phones, and more.

TransUnion

TransUnion

TransUnion is a global information and insights company that makes it possible for businesses and consumers to transact with confidence.

IronClad Encryption (ICE)

IronClad Encryption (ICE)

Ironclad Encryption is Dynamic Encryption. The encryption sequence changes continuously so there is never a correlation between data sent and data received.

Zorus

Zorus

Zorus provides best-in-class cybersecurity products to MSP partners to help them grow their business and protect their clients.

OSC Edge

OSC Edge

OSC was founded with the vision of providing expert solutions in IT to government and businesses. OSC Edge empowers organizations with solutions that prepare them for today and tomorrow.

G-71

G-71

G-71 LeaksID is a cutting-edge ITM technology aimed at safeguarding sensitive documents from insider threats.

Colt Technology Services

Colt Technology Services

Colt Technology Services (Colt) is a global digital infrastructure company which creates extraordinary connections to help businesses succeed.

Offensive Security Manager (OSM)

Offensive Security Manager (OSM)

Offensive Security Manager is the ultimate AI software that will enforce offensive security automation, orchestration, coverage, ensure quality, and lets you manage whole process.

AKIPS

AKIPS

AKIPS develops the world's most scalable network and infrastructure monitoring software, delivered as a turn-key software appliance.