News

2018-01-23

AI Can Simplify The Purchasing Process For Business

US government workers and contractors could use AI to navigate regulations to make the federal purchasing process cheaper and less complex.

2018-01-19

Russian Troops Use Missiles & Cyber To Counter 'swarm of drones'

The Russian military says it has fought off an attack by a swarm of drones launched by jihadists against its Tartus airbase in Syria.

2018-01-22

4 Steps To Get Ready For GDPR

For organisation that do business in the EU in any capacity the General Data Protection Regulation (GDPR) is a crucial piece of legislation.

2018-01-19

FBI's Ability To Disrupt Cybercrime Has Deteriorated

FBI agents took down or disrupted only about one-tenth as many cyber-criminal operations they did three years ago.

2018-01-16

The Top 5 Tech Trends For 2018

As the technological trends keep on advancing in our digital era, 2018 is expected to be a big year for significant updates to existing products.

2018-01-16

Inside the Intel Chip Security Problem

Technology companies are still scrambling to fix serious security flaws affecting computer processors built by Intel and other chipmakers.

2018-01-15

VW and Hyundai To Offer Autonomous Cars

Self-driving taxis will be the staring point for autonomous vehicles offered by the big car companies as they link with technology partners.

2018-01-15

2018 Predictions: Full-Scale Cyber War

Cyberwar looms large as both nation states and law enforcement agencies worldwide will begin to use cyber tactics offensively in the next 12 months.

2018-01-15

Iran’s Cyber Capabilities

Offensive cyber operations have become a core tool of Iranian statecraft, gathering information against enemies at home and abroad.

2018-01-12

Iran’s Cyberwar Could Infiltrate Your Mailbox

Iran’s police crackdown on protesters could affect almost anyone who has been in contact with dissident groups, even people only distantly linked.

2018-01-12

Winter Olympics Targeted

Sochi, Rio and now Pyeongchang are in the hackers crosshairs as hackers attempt to steal sensitive data from the 2018 Winter Olympic Games.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Group-IB

Group-IB

Group-IB is a leading provider of solutions dedicated to detecting and preventing cyberattacks, identifying online fraud, investigating high-tech crimes, and protecting intellectual property.

ARC Advisory Group

ARC Advisory Group

ARC is a leading technology research and advisory firm with expertise in both information technologies (IT) and operational technologies (OT)

Shadowserver Foundation

Shadowserver Foundation

Shadowserver Foundation aims to improve internet security by raising awareness of compromised servers, malicious attackers and the spread of malware.

Athena Dynamics

Athena Dynamics

Athena Dynamics focuses on Cyber Security, especially in Critical Information Infra-structure Protection and Enterprise IT Operation Management products and Services.

Prevalent

Prevalent

Prevalent takes the pain out of third-party risk management. Companies use our services to eliminate the security and compliance exposures that come from working with vendors and suppliers.

CloudVector

CloudVector

CloudVector's API Detection & Response platform is the only API Threat Protection solution that goes beyond the gateway to provide Shadow API Prevention and Deep API Risk Monitoring and Remediation.

Guardara

Guardara

Guardara's mission is to help our customers to continuously improve in every aspect of software development.

Risk Ledger

Risk Ledger

Risk Ledger is improving the security of the global supply chain ecosystem, reducing the number of data breaches experienced through supply chain attacks by companies and consumers alike.

Red River

Red River

Red River is a technology transformation company, bringing 25 years of experience and mission-critical expertise in analytics, cloud, collaboration, mobility, networking and security solutions.

Greenberg Traurig (GT)

Greenberg Traurig (GT)

Greenberg Traurig, LLP (GT) is a global law firm with offices in 40 locations in the United States, Latin America, Europe, Asia, and the Middle East.

Onclave Networks

Onclave Networks

Onclave Networks is a global cybersecurity leader, transforming the future of securing all IT/OT devices and systems.

MoogleLabs

MoogleLabs

MoogleLabs leverage AI/ML, Blockchain, DevOps, and Data Science to come up with the best solutions for diverse businesses.

Coffee Cup Solutions

Coffee Cup Solutions

We offer a full spectrum of IT Services, from our UK based Helpdesk to IT Consultancy and Cyber Security. Our team has the skills and experience to develop, deliver and manage IT for your business.

Seedcamp

Seedcamp

Seedcamp identify and invest early in world-class founders attacking large and global markets through disruptive technology in areas including AI, cybersecurity, and Fintech.

AI or Not

AI or Not

AI or Not - Leverage AI to combat misinformation and elevate the landscape of compliance solutions.

CyberMass

CyberMass

CyberMass provides Cyber Advisory/Consulting, Professional and Managed Services offering complete cybersecurity as a service protection to businesses.