News

2020-06-16

The Leading AI Cyber Security Firms (Part 1)

In a new era of digital business, companies are being driven to rethink their approach to technology. Part 1

2020-06-02

Customer Compensation Claim Follows The EasyJet Hack

EasyJet faces a liability of £18 billion from a class action claim filed in London on behalf of the airline's customers hit by a data breach.

2020-06-03

Do Not Underestimate Iran’s Cyber Threat

Iran is a cyber superpower and has been focusing its efforts on the proposition that future conflicts will require advanced cyber capabilities.

2020-06-02

German Critical Infrastructure At Risk Of Russian Hacking

Russian hackers have a special intrusion technique to target the computer  systems used by industrial firms to manage critical infrastructure.

2020-06-02

Home Working: Reduce The Cyber Risks

Without the security protections that office systems provide, like firewalls and blacklisted IP addresses, remote workers are vulnerable to attack.

2020-06-03

WEBINAR: How to prioritize security controls for sensitive AWS assets

Thursday June 18, 2020: Join AWS Marketplace to learn best practices for tracking & protecting sensitive data in your AWS environment.

2020-06-01

British Government Thinking Again About Huawei

The British government has hit reverse gear and may remove all Huawei-supplied equipment, both 4G and 5G, from the UK telecoms infrastructure.

2020-06-01

Ethical Hackers Have Earned $100m

Bug bounty platform HackerOne has announced that it has paid out $100m in rewards to white-hat hackers around the world to date.

2020-06-23

PIN Authentication Significantly Reduces Cyber Attacks & Data Breaches

MIRACL replaces insecure passwords, complex 2FA and SMS texts with a simple PIN, blocking 99% of attacks on enterprise and B2C accounts.

2020-05-29

Blockchain Can Improve 5G

Latency: Industry experts think that Blockchain technology has significant characteristics that could improve the speed of 5G mobile networks.

2020-05-29

The Influence Of AI On Cyber Security

AI and automation technologies are fast becoming vital to making a unified cyber security platform that organisations can rely on to repel attackers.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Advent IM

Advent IM

Advent IM is one of the UK’s leading independent cyber security specialists, with a unique approach to providing holistic security management solutions.

Verve Industrial

Verve Industrial

Verve specialize in providing software and services to help protect and secure critical industrial control systems.

Celare

Celare

Celare delivers DPI based network perimeter monitoring solutions with integrated Big Data security analytics and threat detection.

Tempered Networks

Tempered Networks

Tempered Networks delivers the first purpose-built platform for IIoT cybersecurity that allows customers to connect and secure devices in minutes without the need for specialized skills.

DarkLight

DarkLight

DarkLight is a cybersecurity platform that mimics human thinking at scale to build resiliency to Advanced Persistent Threats.

Norwest Venture Partners (NVP)

Norwest Venture Partners (NVP)

Norwest Venture Partners offer entrepreneurs a broad range of services to help them build their businesses at every stage of growth. Key sectors include AI, Infrastructure, SaaS and Security.

SECURITI.ai

SECURITI.ai

SECURITI.ai's PrivacyOps platform is a full-stack solution that operationalizes and simplifies privacy compliance using robotic automation and a natural language interface.

Cyber Polygon

Cyber Polygon

Cyber Polygon is an annual online exercise which connects various global organisations to train their competencies and exchange best practices.

Lionfish Cyber Security

Lionfish Cyber Security

Lionfish Cyber Evolution & Empowerment Model™ empowers SMBs to prepare and protect themselves against cyber threats using a unique combination of on-demand training, support and managed services.

Ascent Solutions

Ascent Solutions

Ascent is built to help firms evolve their cybersecurity posture, modernize their Microsoft solutions, and accelerate their journey to the cloud.

Third Point Ventures

Third Point Ventures

Third Point brings deep technical expertise, a strong network of relationships, and decades of investing experience to add value to our partners throughout their journey from idea to IPO and beyond.

Balance Theory

Balance Theory

Balance Theory provides the knowledge infrastructure and collaboration center for the cybersecurity community. A networked community to build better cybersecurity outcomes.

Singularico

Singularico

Singularico help secure your software using the power of AI.

AVANT Communications

AVANT Communications

AVANT is a premier distributor of next generation technologies with the resources and relationships needed to successfully navigate the ever-changing world of communications and IT infrastructure.

Raito

Raito

Raito's unique solution integrates with the data development process and lets data teams monitor, manage, and automate data security across the data stack.

CyberNut

CyberNut

CyberNut are a security awareness training solution built exclusively for schools.