News

2019-08-14

Training Robots & Human Bias

Robotic development is creating computer systems which can substitute and replicate both human actions and human fallibility.

2019-08-14

N. Korea’s Hackers Stole $2b To Fund Its Missile Program

Money stolen from foreign financial institutions by cyber-attacks is now being spent on North Korea's frightening nuclear weapons build-up.

2019-08-14

Microsoft Say The IoT Is Under Attack

One of Russia's elite state-sponsored hacking groups is going after IoT devices as a way to breach corporate networks.

2018-10-05

Russian Agents Are Behind Many Recent Attacks

The British NCSC says that the Russian GRU intelligence agency has long been carrying out widespread 'false flag' cyber attacks.

2019-08-13

Shockwave - A Global Transformation In Warfare

An electronic revolution is happening far quicker than previous revolutions and will significantly change the nature of warfare. By Alfred Rolington

2019-08-13

Cyber Security Jobs & The Skills Gap

IT and Cyber professionals with the requisite knowledge and skills are highly sought after. How can you navigate a new career in cyber security?

2019-08-13

Is The Cloud Skills Gap A Problem?

A lack of talent and skills in the IT sector is a big problem for business. For example, the transition to the cloud, which is now mainstream technology.

2019-08-12

Bank Creates Its Own AI To Identify & Disintegrate Malware

JPMorgan Chase is integrating Artificial Intelligence into its internal security systems to thwart malware infections within its own networks.

2019-08-12

US National Security Agency’s Cyber Offensive

The NSA is forming a new directorate to more closely align the agency’s offensive and defensive operations and to become more aggressive.

2019-08-12

UK Power Outage - The Cyber Effect?

Blackout: Cities, towns, hospitals and transport networks across England and Wales lost electrical power, affecting around 1m UK citizens.

2019-08-09

FBI Turns To Social Media To Track Shooters

The US is growing used to the painful reality of the weaponisation of social media to cause harm. Now the FBI want to use it as an alerting tool.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ISACA Conferences

ISACA Conferences

ISACA is dedicated to offering the most dynamic and inclusive conferences to keep you abreast of the latest advances in IT and Information Security.

Conscia

Conscia

Conscia provides IT infrastructure solutions and 24/7 services in network, data center, security and mobility.

Semperis

Semperis

Semperis is an enterprise identity protection company that enables organizations to quickly recover from accidental or malicious changes and disasters that compromise Active Directory.

FTAPI Software

FTAPI Software

FTAPI SecuTransfer is a software solution for end-to-end encrypted data exchange of large and sensitive data with customers and partners.

Metrarc

Metrarc

Metrarc has developed a ground-breaking technology called ICMetrics™ for deriving secure encryption keys from the properties of digital systems without the need to store any of the encryption keys.

S4x Events

S4x Events

S4x are the most advanced and largest ICS cyber security events in the world.

ContraForce

ContraForce

ContraForce is a threat detection and response software providing complete visibility across cloud, network, endpoints, user, and email with the ability to target and block threats in real-time.

Hyperproof

Hyperproof

Hyperproof is a cloud-based compliance operations software. Launch new programs immediately, collect evidence automatically, and manage a compliance program intelligently.

MainNerve

MainNerve

MainNerve helps secure networks, applications, people, and facilities… enabling businesses to reduce risk and increase their cybersecurity posture.

NSI Global

NSI Global

NSI Global is a specialist Global Risk and Intelligence Advisory Firm that has built a reputation for consistently managing complex projects.

Oasis Technology

Oasis Technology

Oasis Technology are experts in cyber security. In addition to pioneering the game-changing TITAN anti-hacking device, we provide extensive cyber security consulting services.

Space Hellas

Space Hellas

Space Hellas is a dynamic, established System Integrator and Value Added Solutions Provider, holding a leading position in the high technology arena.

Cytidel

Cytidel

Cytidel is a vulnerability and risk management platform that utilises threat and business intelligence to help IT Security teams.

Northern Computer

Northern Computer

Northern Computer provides comprehensive IT solutions that streamline your operations and help you achieve your business goals.

Black Alps

Black Alps

Black Alp's mission is to promote cybersecurity through the organization of dedicated events.

Sirar by STC

Sirar by STC

Sirar is an advanced technology and cybersecurity company established by STC, the MENA region’s ICT and digital services provider.