News

2019-04-09

FBI Takes Too Long To Alert Victims

Auditors report that FBI agents often drag their feet in notifying victims they’ve been breached, leaving networks unnecessarily vulnerable.

2019-07-14

Cyber Knowledge The Easy Way

A new book by acclaimed cyber security expert Alfred Rolington explores the 4th Industrial Revolution, its impact on society and the economy.

2019-04-08

Financial Apps Are Vulnerable

New research reveals widespread security deficiencies indicating that financial institutions are failing when it comes to protecting their apps.

2019-04-08

The Brexit Shaped Gap In UK Cyber Security

Leaving the EU could mean a whole new cyber security regime for the UK and firms need to understand how the changes might affect them.

2019-04-08

British Politicians Need To Better Understand Cyber Security

As critical public services like transport, energy, and our election process are being digitised, cybersecurity is becoming entwined in politics.

2019-04-05

The UK Needs Data Driven Policing

Electronic social change is putting significant pressure on policing. As criminals go digital, hard-pressed police forces need to follow them.

2019-04-04

Identity Management Fundamentals

Identity management is fundamental to information security. Why is it that so many organizations are terrible at it? By Evan Francen

2019-04-08

The EU’s Copyright Directive Risks Creating Two Internets

The EU Parliament’s approval of the Copyright Directive creates substantial new controls on what can be shared online. That's a problem.

2019-04-03

Five Tech Trends Driving Cyber Security

Cybersecurity is an area where the best interests of business, customers and government need to align. A leading CISO identifies the key issues.

2019-04-03

British Cyber Security Strategy Is ‘Chaotic’

With cyber security responsibilities spread across six different departments, the UK government is coming in for biting criticism from its opponents.

2019-04-03

AI Is The New Route For Both Cyber Attacks And Their Prevention

AI is developing quickly and can be applied to several specific uses in cyber security. How useful is the technology and where can it be applied?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

AV Test

AV Test

The AV-TEST Institute is a leading international and independent service provider in the fields of anti-virus research and IT security.

Infiltrate

Infiltrate

INFILTRATE is a deep technical conference that focuses entirely on offensive security issues.

K&D Insurance Brokers

K&D Insurance Brokers

K&D provide insurance for all sectors of industry and commerce including cyber risk cover.

MNCERT/CC

MNCERT/CC

MNCERT/CC is the national Computer Emergency Response Team for Mongolia.

Appdome

Appdome

Appdome is the industry's first mobile integration as a service company, providing solutions for enterprise mobility and mobile application security.

Cybint Solutions

Cybint Solutions

Cybint provides customized cyber education and training solutions for Higher Education, Companies and Government.

Bangladesh Association of Software & Information Services (BASIS)

Bangladesh Association of Software & Information Services (BASIS)

BASIS is the national trade body for Software & IT Enabled Service industry of Bangladesh.

Horiba Mira

Horiba Mira

Horiba Mira is a global provider of automotive engineering, research and test services including services and solutions for automotive cybersecurity.

GK8

GK8

GK8 is a cyber security company that offers a high security custodian technology for managing and safeguarding digital assets. Secure, Compliant and Practical.

Mindsight

Mindsight

Mindsight is a technology consulting firm with expertise from cybersecurity to cloud, disaster recovery to infrastructure, and collaboration to contact center.

Diaplous Group

Diaplous Group

Diaplous Group is a leading Maritime Risk Management (MRM) provider, delivering specialized services to an ever-broadening portfolio of shipping, oil & gas, energy and construction industries.

Opora

Opora

Opora is the leading cybersecurity provider of adversary behavior analytics “ABA” and preemptive security solutions.

Mindaro Insurance

Mindaro Insurance

Mindaro is adding the crucial piece of the cyber security puzzle that protects your organization from the financial ramifications of cyber attacks.

Blink Ops

Blink Ops

Blink helps security teams streamline everyday workflows and protect your organization better.

QEDIT

QEDIT

QEDIT is leading the standardization of Zero-Knowledge Proofs through the ZKProof.org Workshops, and builds production-grade ZKP systems for blockchain.

Triovega

Triovega

Triovega are a leading provider for production security and efficiency. Our solutions enhance OT security, and reduce production downtime.