News

2019-02-25

Lack Of Tech Expertise At Board Level Puts Strategy At Risk

Boards lack the expertise to fully understand the challenges and opportunities that data and technology present to their organisations.

2019-02-25

Hidden Truth About Cyber-Crime: Insider Threats

Malware is not the main cause of data loss. In fact, phishing, privilege breaches and compromised passwords are far more prevalent.

2019-02-20

Obsessive Web Browsing Linked To Depression

A large-scale academic study discovers a link between spending a lot of time browsing the Internet and depressive symptoms.

2019-02-22

Will Blockchain Change the World?

There have been many claims about the potential of Blockchain. Here are some basic concepts to help understand what it is and where it is going.

2019-02-22

The US Pentagon Is Speeding-Up Its Cloud Strategy

The US Defense Department has released its new cloud strategy, laying out the pathway for military adoption of cloud technology.

2019-02-19

Russia May Disconnect From The Internet

Russia wants the capability to isolate its own internet from the rest of the world and is testing the ways to insulate its networks from external access.

2019-02-18

China Accused Of A Cyber-Attack On Australia's Parliament

Australia's security agencies are investigating a breach of their Parliament's computer network suspected to be a foreign government attack.

2019-02-18

Cyberwar Vs. Traditional Conflict

The first difference between cyberwar and traditional warfare is in knowing who exactly attacked you. The second is in knowing when.

2019-02-18

Chinese Hackers Go After Norwegian Businesses

Chinese hackers APT10 have stolen data from a Norwegian cloud software security company, according to experts at Recorded Future & Rapid7.

2019-02-15

British Government Funds Academic Research In Cybersecurity

Researchers based in UK academic institutions can apply for a share of up to £800,000 to support them in commercialising cyber security innovation.

2019-02-19

Cloud Based Technology For Policing

Cloud-based technology can be an effective tool helping law enforcement modernise work practices and better respond to changing societal issues.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Pen Test Partners LLP

Pen Test Partners LLP

Pen Test Partners provides penetration testing, security assessment and training services.

Secure360

Secure360

Secure360 focuses on the following key areas: governance, risk and compliance, information security, physical security, business continuity management, and professional development.

SentryBay

SentryBay

SentryBay is a real-time data security company developing technology for PC, mobile, the cloud and IoT.

Johnson Controls International

Johnson Controls International

Johnson Controls is a global diversified technology company with a focus on smart cities, energy, infrastructure and transportation including the security of automation and control systems.

Pluribus One

Pluribus One

Pluribus One develops customized solutions and other data-driven applications to secure your business and your devices.

Gorodissky IP Security

Gorodissky IP Security

Gorodissky IP Security is a comprehensive approach to protecting your intellectual property on the Internet and beyond.

Fortress Information Security

Fortress Information Security

Fortress Information Security is one of the largest cyber security providers of supply chain risk management and vulnerability risk management in the US.

IP2Location

IP2Location

IP2Location provide services to identify geolocation by IP address, and to detect IP addresses associated with anonymous proxy servers, which are often used for fraud and spamming purposes.

Cyphere

Cyphere

Cyphere is a cyber security company that helps to secure most prized assets of a business. We provide technical risk assessment (pen testing/ethical hacking) and managed security services.

Cranfield University

Cranfield University

Cranfield Defence and Security are at the forefront of their fields, offering capabilities ranging from cyber security and digital warfare to robotics, forensic sciences and simulation and analytics.

ProCheckUp

ProCheckUp

ProCheckUp is a London-based independent provider of cyber security services, including IT Security, Assurance, Compliance and Incident Response.

Salem Cyber

Salem Cyber

Salem Cyber builds Artificial Intelligence (AI) solutions that work collaboratively with people to address scalability challenges in cybersecurity operations.

Wabbi

Wabbi

Wabbi’s continuous security platform centralizes, automates and orchestrates security governance and vulnerability management to empower development teams to own appsec.

Cognisys Group

Cognisys Group

Cognisys provides cyber security penetration testing and compliance services from its offices in Leeds and Manchester.

BSS

BSS

BSS is a solutions and services business based in the UK with a focus on Cyber Security, Data, Financial Crime, Internal Audit, Change, Risk and Resilience.

Aegis Cyber Defense Systems

Aegis Cyber Defense Systems

AEGIS is a powerful cybersecurity tool that can help protect your devices and networks from cyber threats, and increase performance.