News

2018-08-03

Robots Will Invade The Workplace

"The spread of computers ... will put jobs in two categories. People who tell computers what to do, and people who are told by computers what to do."

2018-08-01

UK Business Is Overconfident About Cybersecurity

75% of executives say their company is better prepared than competitors, up from 60% a year ago and 43% said their firm was a top performer.

2018-07-25

Chinese Hackers Target Cambodian Elections

Chinese spies are targeting Cambodian government institutions, opposition party members & media in advance of national elections.

2018-07-31

Facebook & Fake News

Critics claim that Facebook simply isn’t willing to make the hard choices necessary to tackle fake news.

2018-07-31

Palestinian Authorities Under Cyber Attack

A group named Gaza Cybergang that has previously targeted Palestinian law enforcement is now back in action targeting government officials.

2018-07-31

Artificial Intelligence & Threat Detection

Two elite Canadian institutions are embarked on a cybersecurity research collaboration, focused on automated threat detection mechanisms.

2018-07-30

Safeguarding 'the right to be forgotten'

The 'right to be forgotten' is a fundamental human right and recent legislation like the GDPR is an attempt to establish this right for EU citizens.

2018-07-30

The Cyber Security Intelligence Network

BAE Systems has launched a new industry forum and lobbying group called The Intelligence Network to address increases in cyber-attacks.

2018-07-30

What is Digital Twin Technology?

Digital Twin technology has moved beyond manufacturing and into the merging worlds of the IoT, Artificial Intelligence and Data Analytics.

2018-07-27

Maintaining GDPR Compliance

GDPR compliance efforts by many organisations are not just a work in progress, in many cases the work is just beginning.

2018-07-27

Help The Aged: Indian Cops Give Cybersecurity Tips

Police workshops on the latest ATM fraud techniques and phishing, how to protect users' money and what to do in case they fall victim.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Oxygen Forensics

Oxygen Forensics

Oxygen Forensics offer the most advanced forensic data examination tools for mobile devices and cloud services.

GFI Software

GFI Software

GFI Software works with System Administrators, IT Professionals and IT Executives to ensure that their IT infrastructures are monitored, managed, secured and compliant.

Acuity Risk Management

Acuity Risk Management

Acuity Risk Management helps businesses worldwide effectively manage, prioritize and report on their risks to inform strategic and tactical decision-making and build long-term resilience.

Data Shepherd

Data Shepherd

Data Shepherds primary focus is to protect your business. We achieve this by offering extensive and unique expertise in innovative IT and Cyber security solutions.

bwtech@UMBC

bwtech@UMBC

The bwtech@UMBC Cyber Incubator is an innovative business incubation program that delivers business and technical support to start-up and early-stage cybersecurity/IT products and services companies.

Smart Contract Security Alliance

Smart Contract Security Alliance

The Smart Contract Security Alliance supports the blockchain ecosystem by building standards for smart contract security and smart contract audits.

3B Data Security

3B Data Security

3B Data Security offer a range of Penetration Testing, Digital Forensics, Incident Response and Data Breach Management Services.

BaXian Group

BaXian Group

BaXian AG is an international consulting company specializing in IT security, data analytics, risk management and compliance.

PKI Solutions

PKI Solutions

PKI Solutions offers Public Key Infrastructure (PKI) products, services, and training to help ensure the security of organizations now and in the future.

Nemstar

Nemstar

Nemstar is a specialist in Information Security & Cyber Training with over 25 years' industry experience.

IONOS

IONOS

IONOS is a leading provider of cloud infrastructure, cloud services, and hosting with more than 8.5 million customers contracts.

endpointX

endpointX

endpointX is a preventative cyber security company. We help companies minimize their risk of breach by improving cyber hygiene.

Whitaker Brothers

Whitaker Brothers

Whitaker Brothers data destruction equipment can be found in 115 countries and every single continent in the world, from major military organizations to small offices.

SecurityLoophole

SecurityLoophole

SecurityLoophole is an independent cyber security news platform with global coverage. Latest updates, reports, news and events related to cyber security.

Afripol

Afripol

AFRIPOL was set up to strengthen cooperation between the police agencies of AU member states in the prevention and fight against organized transnational crime, terrorism, and cybercrime.

Jitterbit

Jitterbit

Jitterbit integrates critical business processes and enables application development to deliver the experiences and insights needed by enterprises of all sizes to accelerate their digital journey.