News

2018-04-04

Healthcare Security Should Use More Sophisticated Tools

IT staff for healthcare providers must regularly update their cybersecurity practices to keep them ahead of emerging security challenges.

2018-04-04

Staying One Step Ahead Of The Cyber Spies

Growth Market: GCHQ estimate that 34 separate nations have serious, well-funded cyber espionage teams targeting friends and foes alike.

2018-03-28

Snowden Says Bitcoin Is Not Private

The NSA whisltleblower turned tech pundit points out that the blockchain public ledger means that anyone can see Bitcoin transactions.

2018-03-28

Google Launches An Initiative To Tackle Fake News

Google will spend $300m to support the media industry through greater filtration of content, fight misinformation & to support accurate journalism.

2018-04-03

The Symphonic Enterprise

How Strategy, Technology, and Operations Work Together: Leading companies can learn to leverage technology broadly across the enterprise.

2018-04-03

Data Protection Officer's Guide To The GDPR Galaxy

Is the imminent GDPR deadline got you freaking out? These five tips might help you calm down, at least a little bit.

2018-04-03

Self-driving Uber Vehicle Strikes & Kills

Uber has halted testing of its autonomous vehicles in the USA after a woman was struck and killed by one of its self-driving cars in Arizona.

2018-04-03

Have You Gauged The Cost Of A Cloud Outage?

Many organisations have not fully evaluated the cost of a cloud outage to their business and are ill prepared to deal with the impact of an outage.

2018-03-29

Cybersecurity Incidents Are Major Business Disruptions

Insurance giant Allianz finds that cyber incidents and major business interruptions are interlinked and cybersecurity is an urgent priority.

2018-03-28

US City Of Atlanta Suffers An Attack

Atlanta has come under attack in the first known incident of ransomware being used against multiple municipal operations.

2018-03-28

Facebook’s Influence On UK Politics

The idea of marketing to voters on Facebook was brought to the UK by the Obama campaign. It has now become a significant factor in British elections.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jscrambler

Jscrambler

Jscrambler addresses all your JavaScript and Web application protection needs.

Ekran System

Ekran System

Ekran System is an advanced insider threat detection solution for companies of any size.

Digittrade

Digittrade

Digittrade develop and produce external encrypted hard disks and secure communications apps.

authUSB

authUSB

authUSB Safe Door is a tool that provides secure access to the content of USB devices that circulate in organizations.

Baffin Bay Networks

Baffin Bay Networks

Baffin Bay Networks operates globally distributed Threat Protection Centers™, offering DDoS protection, Web Application Protection and Threat Inspection.

Anitian

Anitian

The Anitian Compliance Automation platform builds, configures, and monitors cloud environments to accelerate compliance for standards such as FedRAMP, PCI, ISO/GDPR and CJIS.

American Cybersecurity Institute

American Cybersecurity Institute

American cybersecurity Institute is a newly formed not-for-profit organization dedicated to education, advocacy, study and analysis in the space of cybersecurity law and policy.

Threat Status

Threat Status

Threat Status are a Threat Intelligence company. We are the developers of Trillion. A cloud based Security As A Service (SaaS) platform.

TriagingX

TriagingX

TriagingX successfully created the first generation malware sandbox that is being used by many Fortune 500 companies for daily malware analysis.

Association of anti Virus Asia Researchers (AVAR)

Association of anti Virus Asia Researchers (AVAR)

AVAR's mission is to prevent the spread of and damage caused by malicious software, and to develop cooperative relationships among anti-malware experts in Asia.

Debevoise & Plimpton

Debevoise & Plimpton

Debevoise & Plimpton LLP is a premier law firm with market-leading practices in areas including Data Strategy & Security.

Cyber Unit

Cyber Unit

Cyber Unit offer next level protection from cyber attacks in packages and pricing options that are accessible to smaller organizations.

Battery Ventures

Battery Ventures

Battery partners with talented founders and teams building category-defining businesses at all stages of growth.

Flawnter

Flawnter

Flawnter is a security testing software that finds hidden security and quality flaws in your applications.

AirMDR

AirMDR

Designed by experts, AirMDR solutions cater to the unique demands of security operations centers.

Downdetector

Downdetector

Downdetector helps people all over the world understand disruptions to vital services such as the internet, social media, web hosting platforms, banks, games, entertainment, and more.