News

2018-04-06

Using GDPR Compliance To Excel At CRM

GDPR offers an unprecedented opportunity for businesses to provide better data security and privacy services to their customers.

2018-04-06

The Cambridge Analytica Case Is A Red Herring

There's nothing Cambridge Analytica could have done that Facebook itself doesn't routinely offer political clients.

2018-04-05

Inside the Big Business Of Cyber Crime

Just as big businesses operate based on regulations, the laws of supply and demand and even customer reviews, so does the black market.

2018-04-04

Snowden Says Social Media Is Surveillance 'Rebranded'

Edward Snowden thinks that social media platforms have deceived their users and are, in fact, the same as surveillance companies.

2018-03-29

DARPA Wants AI To Reveal Adversaries' True Intentions

The US Defense Advanced Research Projects Agency will use AI to understand and detect how adversaries are using deception & covert tactics.

2018-04-04

Healthcare Security Should Use More Sophisticated Tools

IT staff for healthcare providers must regularly update their cybersecurity practices to keep them ahead of emerging security challenges.

2018-04-04

Staying One Step Ahead Of The Cyber Spies

Growth Market: GCHQ estimate that 34 separate nations have serious, well-funded cyber espionage teams targeting friends and foes alike.

2018-03-28

Snowden Says Bitcoin Is Not Private

The NSA whisltleblower turned tech pundit points out that the blockchain public ledger means that anyone can see Bitcoin transactions.

2018-03-28

Google Launches An Initiative To Tackle Fake News

Google will spend $300m to support the media industry through greater filtration of content, fight misinformation & to support accurate journalism.

2018-04-03

The Symphonic Enterprise

How Strategy, Technology, and Operations Work Together: Leading companies can learn to leverage technology broadly across the enterprise.

2018-04-03

Data Protection Officer's Guide To The GDPR Galaxy

Is the imminent GDPR deadline got you freaking out? These five tips might help you calm down, at least a little bit.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Security Weekly

Security Weekly

Security Weekly provides free content within the subject areas of IT security news, vulnerabilities, hacking, and research.

CloudDNA

CloudDNA

CloudDNA deliver solutions that enable users and devices to connect over high performance, secure, efficient, scalable cloud networks.

Mako Group

Mako Group

The Mako Group specializes in protection - providing security through auditing, testing, and assessments. And, we do it all with the highest quality standards possible.

Asigra

Asigra

Asigra provides an industry leading cloud backup and recovery software platform called Asigra Cloud Backup.

SecureNow Insurance Broker

SecureNow Insurance Broker

SecureNow is a commercial insurance broker based in India. Services offered include Cyber Risk insurance.

CloudPassage

CloudPassage

CloudPassage, a cloud security and compliance pioneer, safeguards cloud infrastructure for the world’s best-recognized brands.

PhishLabs

PhishLabs

PhishLabs provides 24/7 services that help organizations protect against the cyberattacks targeting their employees, their customers and their brands.

Proteus

Proteus

Proteus is an Information Security consulting firm specialized in Risk Analysis and Executive Control.

Seculert

Seculert

The Seculert Attack Detection & Analytics Platform combines machine-learning based analytics and threat intelligence to automatically detect cyber attacks inside the network.

AimBrain

AimBrain

AimBrain tools detect and prevent fraud, faster and more accurately than ever before.

FraudScope

FraudScope

FraudScope is an AI-assisted platform that accelerates the identification of fraud, waste, and abuse.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Netlinkz

Netlinkz

Netlinkz has developed the Virtual Secure Network (VSN) overlay technology platform, a breakthrough in connectivity security, speed, and simplicity.

Protek International

Protek International

Protek International delivers world-class Digital Forensics, eDiscovery, Cyber Security, and related Advisory services.

AirDroid Business

AirDroid Business

AirDroid Business is an efficient mobile device management solution for Android devices, helping businesses to remotely control and access devices in large quantities using a centralized approach.

Barquin Solutions

Barquin Solutions

Barquin Solutions is a full-service information technology consulting firm focused on supporting U.S. federal government agencies and their partners.