News

2017-11-27

Self-Drive Cars Coming to Manhattan

With some of the densest and most hectic traffic systems in in N. America, what better city to use for testing autonomous cars than New York City?

2017-11-13

All WiFi Networks Are Vulnerable to Hacking

The security protocol protecting the vast majority of WiFi connections has been broken, exposing wireless Internet traffic to eavesdroppers.

2017-11-17

Artificial Intelligence Needs Regulation

As AI becomes widely available it is driving forward a wide range of industrial applications, but there are some big concerns over cybersecurity.

2017-11-10

Cyber Risk Insurance: A View From The Prudential Regulation Authority

The Bank of England's financial services regulatory arm thinks that insurers underrate their exposure to cyber risks.

2017-11-07

AI Applied To Video Analytics

An AI technology that is the world’s first to show an awareness of its environment and of the actions occurring within it has been developed.

2017-11-24

Oxford University’s Cyber Research

Oxford University's Centre for Technology and Global Affairs researches the impact of technology on international relations, government & society.

2017-11-27

Artificial Intelligence, Robotics & All Tomorrows Wars

An Experts Group on robotics and AI have sent a warning letter to the UN Convention on Certain Conventional Weapons. Is anyone listening?

2017-11-23

Robots Could Join The Ukrainian Conflict

Phantom: A Ukrainian military robot with multiple deadly weapons could soon be deployed agints Russian ground forces in Donetsk.

2017-11-20

AI: Experts Talk Ethical & Security Concerns

The future of artificial intelligence was a hot topic at the CYBERSEC Cybersecurity Forum, where security professionals discussed potential of AI.

2017-11-16

Unstructured Data: Threats You Cannot See

Structured data is only a small portion of a larger, more complicated puzzle. Security teams struggle to identify, collect & analyse unstructured data.

2017-12-04

Poor North Korea Is A Cyber Superpower

North Korea may be poor, but has proved its destructive powers and is successfully engaged in a full scale cyberwar with South Korea and the US.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

HUB International

HUB International

HUB is one of the largest insurance brokers in the world. HUB Risk Services provides the full range of expert consulting to identify risks, reduce exposure to loss and manage claims issues.

Onapsis

Onapsis

Onapsis is a pioneer in cybersecurity and compliance solutions for cloud and on-premise ERP and business-critical applications.

Igloo Security

Igloo Security

Igloo Security is a leader and pioneer in SIEM (Security Information & Event Management), PSIM (Physical Security Information Management) and MSS (Managed Security Services).

Squalio

Squalio

Squalio is an information technology group that delivers solutions and services for secure and effective IT management.

RIGCERT

RIGCERT

RIGCERT provides training, audit and certification services for multiple fields including Information Security.

Space ISAC

Space ISAC

Space ISAC is the only all-threats security information source for the public and private space sector.

Quintillion Consulting

Quintillion Consulting

Quintillion Consulting is a strategic risk based consulting firm. We help companies safeguard the core business and IT capabilities that deliver competitive advantage.

Kainos

Kainos

Kainos is a leading provider of Digital Services and Platforms. Our services include Digital Transformation, Cyber Security, Cloud, AI, IoT and more.

boxxe

boxxe

boxxe create flexible IT infrastructures, collaborative global workspaces and data clarity, all underpinned by world-leading security.

JupiterOne

JupiterOne

JupiterOne is the security product that is changing how organizations manage and secure their software defined assets.

Evolution Equity Partners

Evolution Equity Partners

Evolution Equity Partners is an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies.

Crowe

Crowe

Crowe is a public accounting, consulting, and technology firm that combines deep industry and specialized expertise with innovation.

Ascent Solutions

Ascent Solutions

Ascent is built to help firms evolve their cybersecurity posture, modernize their Microsoft solutions, and accelerate their journey to the cloud.

Dropzone AI

Dropzone AI

Dropzone AI are creating a generational leap in SecOps by using AI to automate cyber expertise and tooling.

Bearer

Bearer

Bearer helps modern teams ship trustworthy products with the help of our code security solution built for security, privacy and engineering teams.

AmiViz

AmiViz

AmiViz is the first B2B enterprise marketplace focussed on Cybersecurity business in the Middle East and Africa, designed specially to serve the interests of enterprise resellers and vendors.