News

2018-04-23

Increase In State-Sponsored Cyber Attacks

States that would be too small to consider starting a traditional war now see opportunities to wage cyber war and strike virtual blows.

2018-04-24

Will AI Replace Most Jobs?

The persistent question about artificial intelligence, or “robots” in common parlance, is whether they will make human workers obsolete.

2018-04-25

The Cyber Threat To Airports

The aviation industry is growing increasingly concerned about the range of sophisticated cyber threats faced by airlines and airport systems.

2018-05-01

Help The Aged With IoT

Internet of Things devices that will track whether care home residents are starting to wander away from the facilities so staff can intercept them.

2018-04-30

SpaceX Plan For 4k Satellite Broadband Network

SpaceX intends to launch a network of thousands of satellites creating blanket global broadband coverage.

2018-04-30

The Impact Of Cybercrime On UK Business

Government figures for 2017 reveal that almost half of all UK firms were hit by a cyber breach or attack in the previous year, costing £11 billion.

2018-04-25

Leaked Emails Expose Russian Exploits In Ukraine

Kompromat: A cache of leaked documents seems to show that the Kremlin is prepared to pay for hacking, propaganda and deception operations.

2018-04-24

Six Myths About GDPR

Despite months of publicity about GDPR, including the potential benefits of compliance, very few organisations are ready for the May 25 mandate.

2018-04-24

A New Cold War Will Not Be Based On Hardware.

Russia's use of 'fake news' and asymmetrical warfare techniques is compensating for its weakness in more traditional military capabilities.

2018-04-07

Fixing Hacks Has A Deadly Impact On Hospitals

A study from Vanderbilt University shows that remediating data breaches has a very real impact on mortality rates at hospitals.

2018-04-30

Six Steps to Protect Customer Data

Data abuse and mishandling can have grave consequences. The Internet Society has six recommendations to promote trust among users.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Interpol

Interpol

Interpol is the world’s largest international police organization. It is committed to the global fight against cybercrime, as well as tackling cyber-enabled crimes.

NordForsk

NordForsk

NordForsk facilitates and provides funding for Nordic research cooperation and research infrastructure. Project areas include digitalisation and digital security.

Compumatica

Compumatica

Compumatica is a leading European ICT security manufacturer for cybersecurity and encryption products. Solutions include network security, SCADA/ICS security, Mobile/BYOD and email encryption.

PRESENSE Technologies

PRESENSE Technologies

PRESENSE Technologies specializes in monitoring and enforcing IT security policies at critical points in the network and on end systems.

Secudos

Secudos

SECUDOS is an innovative appliance technology and services provider focused on IT security and compliance.

Quokka

Quokka

Quokka (formerly Kryptowire) is the source for mobile security and privacy solutions, staying steps ahead of the threat and delivering peace of mind.

PBOSecure

PBOSecure

PBOSecure is a dynamic and progressive IT consultancy company specializing in IT and Industrial Control System (ICS) security.

CyberQ Group

CyberQ Group

CyberQ is an award winning cyber security consultancy and services provider and an innovator in Artificial Intelligence and Automated Cyber Security.

Hub One

Hub One

Hub One is a leading player in digital transformation with expertise in broadband connectivity, business solutions for traceability and mobility, IOT in industrial environments and cybersecurity.

Sierra Ventures

Sierra Ventures

Sierra Ventures is an early-stage venture firm investing globally with a focus on Next Generation Enterprise and Emerging Technologies.

Iron Bow Technologies

Iron Bow Technologies

Iron Bow Technologies is a leading IT solution provider dedicated to successfully transforming technology investments into business capabilities for government, commercial and healthcare clients.

Bionic

Bionic

Bionic is an agentless way to get control over your increasingly complex applications so you can manage, operate, and secure them faster and more efficiently.

Help AG

Help AG

Help AG provides leading enterprise businesses and governments across the Middle East with strategic consultancy combined with tailored information security solutions and services.

Fescaro

Fescaro

FESCARO is a trusted cybersecurity partner for global automakers and their partners, helping them transition to software-defined vehicles (SDVs) with tailored automotive software solutions.

Aliro Security

Aliro Security

AliroNet is the world’s first entanglement Advanced Secure Network solution.

LMNTRIX

LMNTRIX

LMNTRIX eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent and respond to cyberattacks.