News

2020-02-17

British CEOs Worry About Cyber Attacks While Their Businesses Are Under-Insured

Surveys suggest that cyber threats are top of the most pressing risks facing UK businesses leaders, yet less than 20% have a cyber insurance policy.

2020-02-17

Some Expert Predictions For Industrial Cyber Security

Industrial control systems are becoming increasingly connected. They are also becoming increasingly vulnerable. Business must get ready.

2020-02-17

GDPR's Impact In The US And Globally

Outside of the European Union you might think that it doesn’t apply to you, but GDPR affects organisations and businesses worldwide.

2020-02-17

The Human Effect On AI Security

Although innovations in ArtificiaI Intelligence are transforming cybersecurity, the key high level aspects remain essentially human.

2020-02-17

Labour Party Risks £15m Fine For Not protecting Members' Data

Accusations of dirty tricks are flying in the British Labour Party leadership contest as competing factions claim illegal access to membership data.

2020-02-17

It Was The Chinese Army That Hacked Equifax

The Justice Dept. has charged four Chinese army officers for the attack on Equifax that stole the personal information of 145 million US citizens.

2020-02-14

Cyber Attacks On Banks Could Trigger Financial Crisis

The head of the European Central Bank, Christine Lagarde, is warning that a combined cyber-attack on major banks could trigger economic instability.

2020-02-14

Cyber Incidents Jump Up The Risk Index

Insurance giant Allianz now ranks cyber incidents as the most important business risk globally, ahead of both business interruption & climate change.

2020-02-13

New York Launches $100m Cyber Security Hub

The $100 million partnership, including a $30 million contribution from NYC, will focus on companies working in the cyber technology sector.

2020-02-13

Poor Cyber Resilience In Aviation

Only 3 out of 100 of the world's largest airports are secure against cyber security risks like vulnerable data and misconfigured applications.

2020-02-12

Saudi Aramco Under Repeated Attack

The giant oil business is experiencing a sharp increase in cyber attacks, includng the powerful Emotet malware, which it has foiled so far.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Security Mentor

Security Mentor

Security Mentor provides innovative, online security awareness training designed for how people learn and work.

Arxan Technologies

Arxan Technologies

Arxan is a leader of application attack-prevention and self-protection products for Internet of Things (IoT), Mobile, Desktop, and other applications.

National Cyber Security Centre (NKSC) - Lithuania

National Cyber Security Centre (NKSC) - Lithuania

NKSC is the main Lithuanian cyber security institution, responsible for unified management of cyber incidents, monitoring and control of the implementation of cyber security requirements.

Ilex International

Ilex International

Ilex International is a European software vendor which specialises in Identity & Access Management solutions.

Idaptive

Idaptive

Idaptive delivers Next-Gen Access through a zero trust approach. Idaptive secures access everywhere with single sign-on, adaptive MFA, EMM and analytics.

6point6

6point6

6point6 is a technology consultancy with strong expertise in digital transformation, emerging technology and cyber security.

24By7Security

24By7Security

24By7Security are Cybersecurity & Compliance Specialists with extensive hands on experience helping businesses build a defensive IT Infrastructure against all cyber security threats.

Start Left® Security

Start Left® Security

Great security culture doesn't just happen; you ENGINEER it.

Managed IT Services

Managed IT Services

Managed IT Services is a managed IT Services Company offering a diverse range of Cyber Security services and IT solutions.

Stronger International

Stronger International

Stronger International provides expert cyber services and training to organizations and individuals to enhance IT and security knowledge.

Blacksands

Blacksands

Blacksands is a leader in network architecture, identity & services management, threat analysis, industrial IoT architecture, and invisible dynamic networks.

Mindaro Insurance

Mindaro Insurance

Mindaro is adding the crucial piece of the cyber security puzzle that protects your organization from the financial ramifications of cyber attacks.

SK Shieldus

SK Shieldus

SK shieldus are a converged security provider with business capabilities in both cybersecurity and physical security based on Big-Tech.

Securious

Securious

If you need to improve your cyber security or achieve cyber security accreditations, Securious provide an independent service that will identify and address your issues quickly and efficiently.

LockMagic

LockMagic

Lockmagic is an information asset management solution to protect, track, audit and control accesses to sensitive information inside and outside your organization.

Runecast Solutions

Runecast Solutions

Runecast Solutions is a global leader in AI-powered risk mitigation, security, continuous compliance and more efficient IT operations management.