News

2018-02-14

Girls Are Future Cybercrime Fighters

There are many career opportunities for girls in cybersecurity, but only 11 percent of the world's information security workforce are women.

2018-02-15

What is the Industrial IoT?

The IIOT connects machines and devices in industries across transportation, power and healthcare. The potential is high and so are the risks.

2018-02-14

Businesses Using Apple & Cisco Products Pay Less For Insurance

Superior Security: Insurance giant Allianz will give businesses using Apple & Cisco products better terms on their cyber insurance coverage.

2018-02-15

Self-Drive Trucks Now Working In Australia

Self-driving trucks have begun to hit the roads in the United States, but they’re already hard at work in Australia.

2018-02-15

Islamic State Likely To Switch To Cyber Warfare

Along with other terrorist groups IS are turning to the cybercrime underworld to secure tools to carry out attacks on critical infrastructure.

2018-02-13

Will AI Make Data Analytics Jobs Obsolete?

Data analytics is one of the hottest fields in IT and one of the most in-demand jobs in the broader market. But AI is catching up.

2018-02-13

The Distorted Reality Of Algorithms

Algorithms can distort the truth, as demonstrated by the shocking chain of events following a 'YouTube celebrity' finding a dead body.

2018-02-13

Cyber Attackers Will Soon Kill Somebody

British spy chief says it is only a matter of time before a cyber attack on Britain results in deaths.

2018-02-12

How GDPR Affects Your Marketing Strategy

GDPR has a very big impact for marketing professionals. The experts at GDPR Advisory Board have straightforward advice for them.

2018-02-12

Nation State Hacking Is On Trend In 2018

In 2017 attackers working for nation-states focused on efficiency and return on investment, and were very successful. This trend will only get bigger.

2018-02-12

What Does Brexit Mean For Britain's Spies?

As the UK negotiates Brexit, two former intelligence chiefs warn that Britain's security expertise should not become a "bargaining chip".

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ReadWrite

ReadWrite

ReadWrite is a leading media platform dedicated to IoT and the Connected World.

BitSight Technologies

BitSight Technologies

BitSight transforms how companies manage information security risk with objective, verifiable and actionable Security Ratings.

SGBox

SGBox

SGBox is a highly flexible and scalable solution for IT security. Choose the modules which your company needs and implement it without any modification to your network infrastructure.

Open Cloud Factory

Open Cloud Factory

Open Cloud Factory is a European based security company, that strives to ease the pressure on IT managers, by providing tools to implement your Security Strategy in an effective and easy manner.

Smart Protection

Smart Protection

Smart Protection are experts in brand and trademark protection - we fight against counterfeits and unauthorized usages of brands with machine learning technology.

Sierra Ventures

Sierra Ventures

Sierra Ventures is an early-stage venture firm investing globally with a focus on Next Generation Enterprise and Emerging Technologies.

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

GCSCC's work is focused on developing a framework for understanding what works, what doesn’t work and why – across all areas of cybersecurity capacity.

Netography

Netography

Netography provides a scalable and reliable platform for detection & remediation of cyber threats found on your network.

KanREN

KanREN

KanREN is a member based consortium offering custom, world-class network services and support for researchers, educators, and public service institutions in the state of Kansas.

1Touch.io

1Touch.io

1touch.io Inventa is an AI-based, sustainable data discovery and classification platform that provides automated, near real-time discovery, mapping, and cataloging of all sensitive data.

Ghost Security

Ghost Security

Ghost is a venture backed, product-led startup building the new standard in application security for the modern enterprise.

Centroid

Centroid

Centroid is a cloud services and technology company that provides Oracle enterprise workload consulting and managed services across Oracle, Azure, Amazon, Google, and private cloud.

Curatrix Technologies

Curatrix Technologies

Curatrix Technologies is a Managed IT Service provider based in Hampshire, UK, providing high quality and reliable Managed IT Services since 2015.

Cyber Octet

Cyber Octet

Cyber Octet is an IT Solution, Security, Training and Services company. We provide training and services from Web Application Security to ISO 27001 implementation.

Highen Fintech

Highen Fintech

Highen is a blockchain software development company with offices in the United States and development centers in India.

The Hacking Games

The Hacking Games

The Hacking Games' Mission is to inspire, educate and mobilise a generation of ethical hackers to make the world a safer place.