News

2019-04-15

The Quantum Computer Threat To Encryption Should Be Taken Seriously

The advanced capabilities of quantum computers will render most traditional encryption protocols used today obsolete.

2019-04-12

Zain Qaider And The Sixty Year Rule

It has been sixty years since pornography has been officially taboo, but only now has a cyber criminal been brought to justice for exploiting it.

2019-04-11

The Maritime Shipping Industry Should Be On Red Alert

There is widespread concern that the maritime industry remains vulnerable and is not doing enough to protect itself from cyber criminals.

2019-04-11

Websites To Be Fined Over 'online harms' Under New UK Law

Websites could be fined or blocked if they fail to tackle "online harms" such as terrorist propaganda and child abuse, under British government plans.

2019-04-10

Critical Infrastructure Is Under Worldwide Attack

Every minute of the day, cyber-attacks are causing severe technology problems, disrupting and taking down different parts of the infrastructure system.

2019-04-10

Facebook Is Hosting Multiple Cybercrime Marketplaces

Facebook has been host to "dozens" of busy marketplaces and exchanges used by cyber-thieves to buy and sell stolen goods.

2019-04-10

A Snapshot Of Cybercrime In The UK

Action Fraud report a 24% increase in cybercrime over a 6 month period in 2018 and in one city, an annual increase of 85%, driven by identity theft.

2019-04-10

What is The Canadian Institute For Cybersecurity & Why Does It Matter?

The new Canadian Institute for Cybersecurity is the first national institution of its kind to take such a multidisciplinary approach to cybersecurity.

2019-04-09

Naval Hacker Team To Fight Drones

The US Navy is assembling a team of engineers, researchers and some hackers to develop ways to fight off swarms of cheap commercial drones.

2019-04-09

Top Blockchain Challenges For CIOs

The experts at Gartner think the world is just five years away from blockchain becoming mainstream and CISOs must adapt to take advantage.

2019-04-09

Britain's National Cyber Security Strategy Beyond 2021

The UK is halfway through its 2nd National Cyber Security Programme and focus is beginning to shift to considering the future strategy beyond 2021.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CyberPolicy

CyberPolicy

CyberPolicy is a cyber protection solution for small businesses. It combines three important components against cyber threats - Cyber Plan, Cybersecurity and Cyber Insurance.

CyberScout

CyberScout

Cyberscout delivers the latest cybersecurity education, protection and resolutions services. We also provide swift incident response services around the world.

Networkers

Networkers

Networkers is a global recruitment consultancy helping unite job-seekers and hiring companies across the technology industry.

MadSec Security

MadSec Security

MadSec Security is a leading consulting company whose expertise are information and cyber security.

Codeproof Technologies

Codeproof Technologies

The Codeproof enterprise mobility solution empowers your business to secure, deploy and manage mobile applications and data on smartphones, tablets, IoT devices and more.

BrandProtections.Online

BrandProtections.Online

BrandProtections.online offer end-to-end customer support solutions to help protect against threats which may affect your brand online.

Sayata Labs

Sayata Labs

Sayata delivers a streamlined solution for processing cyber policies. Increase profitability with an easy and intuitive platform.

Wolverhampton Cyber Research Institute (WCRI)

Wolverhampton Cyber Research Institute (WCRI)

Wolverhampton Cyber Research Institute builds on the strength of its members in the area of network and communication security, artificial intelligence, big data and cyber physical systems.

Microland

Microland

Microland’s delivery of digital is all about making technology do more and intrude less for global enterprises. Our services include Cloud & Data Center, Networks, Cybersecurity and more.

Securance Consulting

Securance Consulting

Since 2002, Securance has empowered enterprises to assume proactive security, compliance, and risk management strategies.

COPA-DATA

COPA-DATA

COPA-DATA is the only independent software manufacturer to combine in-depth experience in automation with new possibilities of digital transformation – reliable, future-proof and operating worldwide.

KnoTra Global

KnoTra Global

KnoTra Global is a next-generation Managed Service provider with a portfolio of services including Cybersecurity Solutions, Network Management, IT Leadership, and Day-to-Day Helpdesk and IT services.

Kolide

Kolide

Kolide ensures that if a device isn't secure, it can't access your apps.

Backslash Security

Backslash Security

With Backslash, AppSec teams gain visibility into critical risks in their apps based on reachability and exploitability.

Identifid

Identifid

Identifid offers a suite of fraud prevention and identity authentication solutions to businesses and governments using the latest advances in AI, vision processing, and biometric recognition.

DeepTempo

DeepTempo

At DeepTempo, we build AI models and related software that protect enterprises and service providers from sophisticated cyber threats.