News

2019-04-02

How Can Boardrooms Effectively Manage Cyber Risk?

For too long, cyber security standards and best-practice have been targeting technical and operational levels, too complex for boards to grasp.

2019-04-02

New Zealand Reconsiders Mass Surveillance

After the mass murders in Christchurch, NZ politicians are talking about resuming a wide ranging mass surveillance program.

2019-04-02

Facebook Removes Suspicious Accounts For 'inauthentic behavior'

Facebook responds to critics by removing accounts in Iran, Russia, Macedonia & Kosovo demonstrating coordinated suspicious behavior.

2019-03-30

Security Flaw Puts UK Bank Customers At Risk

RBS customers have been put at risk of cyber-attack after being recommended flawed security software by the bank.

2019-04-01

Company Directors Must Become Cyber Aware

The UK is home to world leading businesses but the threat of cyber-attacks is always present. Business leaders must do more to reduce their risk.

2019-04-01

Ukraine Battles To Combat Election Hackers

The outcome of elections in Ukraine could hang in the balance if previous attacks by Russian hackers are successfully repeated.

2019-04-01

Quantum Computing Will Break Encryption

Modern public-key encryption techniques will soon be challenged by rapid advances in Quantum computing.

2019-03-29

Combining AI’s Power With Self-Centered Human Nature Could Be Dangerous

Its is not safe to think that as AI develops it will become more human-like.The reality is likely to be far more disconcerting and incomprehensible.

2019-03-29

What Should You Do If Your Business Is Hit By A Cyber Attack?

Its not just big businesses that are vulnerable. For Directors of SME's, cyber-attacks are something really important for them to worry about.

2019-03-28

Over 90% Of Security Pros Fear Insider Threats

The vast majority of IT and security professionals surveyed said they feel vulnerable to insider threats, either malicious or accidental.

2019-03-28

"Cookie Walls" Non-Compliant With GDPR

The Dutch Data Protection Agency says "cookie walls" that demand a website visitor agrees to being tracked are not compliant with EU law.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

SABSACourses

SABSACourses

SABSA is a development process used for solving complex problems such as IT Operations, Risk Management, Compliance & Audit functions.

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation is Europe's leading centre for research & education in cybersecurity, cybercrime and digital forensics.

National Cyber Security Centre (NCSC) - United Kingdom

National Cyber Security Centre (NCSC) - United Kingdom

The NCSC acts as a bridge between industry and government, providing a unified source of advice, guidance and support on cyber security, including the management of cyber security incidents.

Custodio Technologies

Custodio Technologies

Custodio Technologies was established as a Singaporean R&D Centre of Israel Aerospace Industries (IAI) in order to spearhead R&D activities in the field of cyber early warning.

Secude

Secude

SECUDE is an established global security solutions provider offering innovative data protection for SAP users.

KOS-CERT

KOS-CERT

KOS-CERT is the national Computer Incident Response Team for Kosovo.

Axence

Axence

Axence provides professional solutions for the comprehensive management of IT infrastructure for companies and institutions all over the world.

Yaana Technologies

Yaana Technologies

Yaana is a leading provider of intelligent compliance solutions including lawful interception, data retention & disclosure, and advanced security analytics.

Vesta

Vesta

Vesta Corporation is a global provider of a scalable suite of fraud and payment solutions for online commerce.

ShorePoint

ShorePoint

ShorePoint is an elite cybersecurity firm dedicated to improving the cyber resilience of Federal agencies and their missions.

Connectria

Connectria

Connectria provides cloud hosting, remote monitoring, and compliant cloud security solutions and services to enterprises, medium and small businesses.

FireCompass

FireCompass

FireCompass SAAS platform helps CISOs & Security Teams in continuous risk assessment by mapping your attack surface and knowing the “unknown unknowns”.

Gluu

Gluu

Modern Authentication for Digital Enterprise. Organizations around the world trust Gluu for large-scale, high-security identity & access management.

SecureWorx

SecureWorx

SecureWorx are a secure multi-cloud MSP, a provider of advanced IT security services and an independent cyber security advisory.

SkillsDA

SkillsDA

SkillsDA is pureplay company in cyber security involved in capacity building towards National Security.

Harmonic Security

Harmonic Security

Harmonic Security helps companies to adopt Generative AI without risking the security and privacy of their data.