News

2018-05-21

The Swiss Bank Where Robots Replace Employees

Process Automation: Why have seven employees work for three days when software robots can do the job instead?

2018-05-21

Secure Encrypted Email Platform PGP Is Not Secure

PGP as used by Edward Snowden was believed to be one of the most secure methods of protecting private email communications. That's not so.

2018-05-21

Ex-Employee Suspected Of Leaking CIA Hacking Tools

A CIA operative who worked on computer code used to spy on foreign adversaries is suspected of giving top-secret information to WikiLeaks.

2018-05-18

NSA Spies Triple Text and Phone Collection

The US intelligence agency collected 534 million domestic phone records last year, even though its bulk interception power is limited by federal law.

2018-05-18

'Cyber is Uncharted Territory And It’s Going To Get Worse…’

Investor Warren Buffet is worried his insurance business may suffer a disastrous claim for its insured cyber liabilities.

2018-05-18

How Do Hackers Hide Their IP Address?

Cyber-criminals could be operating from any part of the world and can remain untraceable because they can hide their IP addresses from prying eyes.

2018-05-18

China Is Behind A Decade Of Hacks On Software Companies

Chinese spy agencies are behind a decade of network intrusions using advanced malware to penetrate US, EU & Russian software companies.

2018-05-17

About Cyber Insurance

Following a sequence of international events featuring major data breaches, cyber insurance has really caught on. Here's a quick summary.

2018-05-17

Corporate Lawyers Brace For GDPR

In-house lawyers expect to play a greater role in cybersecurity as organisations brace themselves for the arrival of the GDPR data protection regime.

2018-05-16

Your Next Bank Card is a Finger-Scanner

Biometric Authentication: People may forget their PINs but very rarely do they go out without their fingers.

2018-05-16

Getting The Most From Investing In AI

Artificial Intelligence is forcing companies to apply a business strategy that combines intelligent technologies and human talent to reach customers.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Alan Boswell Group

Alan Boswell Group

We are a Group of Companies providing specialist Insurance Broking and Risk Management advice and services including Cyber Risk cover.

Exabeam

Exabeam

Exabeam is a global cybersecurity leader that delivers AI-driven security operations.

Malomatia

Malomatia

Malomatia is a leading provider of technology services and solutions in Qatar including information security.

Truepic

Truepic

Truepic provides technologies that prevent fraud, identity theft, misinformation, and disinformation caused by generative, manipulated, or deepfake digital content.

Armorblox

Armorblox

Armorblox stops targeted email attacks such as 0-day credential phishing, payroll fraud, vendor fraud, and other threats that get past legacy security controls.

RiskRecon

RiskRecon

RiskRecon makes it easy to gain deep, risk contextualized insight into the cybersecurity risk performance of all of your third parties.

PatrOwl

PatrOwl

Automate your SecOps with PatrOwl, and start defending your assets efficiently.

Trustify

Trustify

Trustify is a Managed Security Service Provider offering a suite of world-class Cyber Risk Management services.

Darkbeam

Darkbeam

Darkbeam provides a unified solution to protect against security, brand and compliance risks across your digital infrastructure.

Aryaka

Aryaka

Aryaka’s SmartServices offer connectivity, application acceleration, security, cloud networking and insights leveraging global orchestration and provisioning.

Wisetek

Wisetek

Wisetek is a global provider of end-to-end IT Asset Disposition (ITAD), reuse and secure data destruction management services to the world’s leading IT Corporations, data centres and manufacturers.

NXTsoft

NXTsoft

NXTsoft’s solutions help businesses secure, connect and optimize their data to maximize revenue opportunities, enhance profitability, and mitigate cybersecurity risk.

Secure Diversity

Secure Diversity

Secure Diversity is an innovative non-profit organization with leaders that think out of the box to create strategies & solutions to increase diversity in the cybersecurity industry.

RiskOptics

RiskOptics

RiskOptics (formerly Reciprocity) equips organizations with one of the most intuitive and powerful information security and cyber risk management solutions in the market.

Paperclip

Paperclip

Paperclip provides paperless solutions while enabling compliance and security for the exchange of critical content.

Elastio

Elastio

Elastio's cloud-native platform safeguards cloud data from the risks posed by ransomware, application failures and storage security vulnerabilities.