News

2018-02-26

What’s Happening With China’s Fintech?

A unique technology ecosystem: A tech-savvy population, an underdeveloped banking industry, and an initially relaxed regulatory environment.

2018-02-26

Fake News: Could A Cyberattack Cause A Cyberwar?

Fake news is actually a form of cyberattack. When people believe everything they read on social media, the world becomes an unpredictable place.

2018-02-27

Your Questions Answered By The GDPR Advisory Board

The big GDPR questions answered by the professional experts at the GDPR Advisory Board, Dr Alfred Rolington and Piers Clayden.

2018-02-26

FBI, CIA & NSA Officials Agree: Stay Away From Huawei Phones

Without disclosing hard evidence, the US intelligence establishment are united in accusing the Chinese telecoms giant of cyber espionage.

2018-02-23

Cybersecurity Is A Job for CEOs, Not Just The IT Team

Cyber attacks on business pose real dangers to the bottom line and corporate reputation. They must be dealt with first-hand in the boardroom.

2018-02-23

Police Prepare for Cyber Attacks

Canada is heightening its cybersecuity defenses across the board, not least in its regional police forces.

2018-03-02

Delve Into GDPR - Questions & Answers

A team of GDPR experts giving straightforward advice and help for those with queries about this critical new legislation.

2018-02-22

Cyber Threats Will Grow With GDPR

The cyber threat landscape will only get worse under GDPR and it could be cheaper to pay ransom and stay silent than pay the fines.

2018-02-22

AI Will Underpin Cybersecurity

Cybersecurity risks are growing in complexity and volume, but artificial intelligence techniques can help businesses fight them in real time.

2018-02-21

Tackling The Insider Threat: … Where To Start?

Many organisations still believe the insider threat is limited to a rogue employee, but insider threats don't have to be malicious.

2018-02-21

AI In Conflict: Cyberwar & Robot Soldiers

Munich Security Conference: The use of robots and artificial intelligence within the military sphere might make the whole world more unstable.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Riverbed Technology

Riverbed Technology

The Riverbed Network and Application Performance Platform enables organizations to visualize, optimize, accelerate and remediate the performance of any network for any application.

HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking, a Hewlett Packard Enterprise company, is a leading provider of next-generation network access solutions for the mobile enterprise.

Bundesdruckerei

Bundesdruckerei

Bundesdruckerei specializes in secure identity technologies and services for protecting sensitive data, communications and infrastructures.

SECURITYMADEIN.LU

SECURITYMADEIN.LU

SECURITYMADEIN.LU is the main online source for cyber security in Luxembourg providing news, information and a toolbox of cyber security solutions.

Wotan Monitoring

Wotan Monitoring

Wotan Monitoring is the software solution for fully automatic process monitoring, infrastructure monitoring and end-to-end monitoring.

Anect

Anect

Anect is a leading provider of ICT security and services for hybrid and cloud solutions.

Watchdata Technologies

Watchdata Technologies

Watchdata Technologies is a pioneer in digital authentication and transaction security.

DAtAnchor

DAtAnchor

Anchor is simply a better way to protect and control sensitive data. Zero-trust, data-centric security. Simplified.

Comcast Business

Comcast Business

Comcast Business keeps businesses ready for what’s next with powerful connectivity, advanced cybersecurity solutions, and the right people at your side.

LANCOM Systems

LANCOM Systems

LANCOM Systems is the leading European manufacturer of secure, reliable and future-proof networking (WAN, LAN, WLAN) and firewall solutions for the public and private sectors.

Cardonet

Cardonet

Cardonet is an IT Support and IT Services business offering end-to-end IT services, 24x7 IT Support to IT Consultancy, Managed IT and Cyber Security.

Anterix

Anterix

Anterix is focused on empowering the modernization of critical infrastructure and enterprise businesses by enabling private broadband connectivity.

Zerify

Zerify

Zerify offers the industry’s only video conferencing platform built with a zero-trust architecture to keep your meetings secure, private and business compliant.

SE Ventures

SE Ventures

SE Ventures provides capital to big ideas and bold entrepreneurs who can benefit from Schneider Electric's deep domain expertise, R&D assets, and global customer base.

Beround

Beround

Beround is an IT consultancy firm specialized in software testing.

Jersey Cyber Security Centre (JCSC)

Jersey Cyber Security Centre (JCSC)

Jersey Cyber Security Centre is the jurisdiction's Cyber Emergency Response Team (CERT) and national technical authority for cyber security.