News

2017-09-27

Is the Flying Car Ready For Take-off?

As densely populated cities become bigger and more congested several well-funded new companies are developing urban flying cars.

2017-09-27

Cybersecurity Investigations After US Naval Collision

Probing for potential cyber intrusions will become a standard procedure following unexplained collision damage to a US guided missile destroyer.

2017-09-28

Global Cyber Conflict Is Close

It is probable, not just possible, that cyberattacks will soon shut down power grids, paralyse financial data systems & sabotage military equipment.

2017-09-18

Measuring The Economic Value of Data

Data is one of the most important assets that a company has and they should put the same rigor into the value of data as into their physical assets.

2017-09-15

Cybercrime In The EU - Where Are You Safe?

Website Builder Expert recently conducted research into just how vulnerable computer users in the EU are to cybercrime. There are some surprises.

2017-09-14

FBI Wants To Ditch Kaspersky

The FBI seem to think the Kaspersky cybersecurity company is a Russian stooge that can't be trusted with protecting America's critical infrastructure.

2017-09-19

Cyber Insurance Report 2017 - 2018 (£)

New cyber threats are constantly evolving and all organisations must improve their cybersecurity preparedness.

2017-09-27

Fake Facebook Ads Surged During The US Presidential Election

Facebook now admits that fake accounts probably operated from Russia bought thousands of divisive advertisements on during the 2016 US election.

2017-09-27

Dragonfly Threat: Hackers Will Sabotage Power Grids

The experts at Symantec say a hacking campaign is underway, targeting the energy sector in Europe and the US to sabotage national power grids.

2017-09-23

US Police Real-Time Mapping Of Terrorist Attacks

A new technology for police and other first-responders supplies a real-time mapping capability to deal with active shooting attacks.

2017-09-26

IT Jobs Are Bound For Extinction

Top Tech jobs, even some of today’s hottest, like developers and data scientists,could one day find themselves on the digital scrap heap.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Social-Engineer

Social-Engineer

Social-Engineer is a team of outside–the–box thinkers that share a common focus on human-to-human social engineering.

CERTuy

CERTuy

CERTuy is the national Computer Emergency Response Team for Uruguay.

Greenbone Networks

Greenbone Networks

Greenbone Networks delivers a vulnerability analysis solution for enterprise IT which includes reporting and security change management.

Bolton Labs

Bolton Labs

Bolton Labs is a leading provider cybersecurity services, tools, and analysis for MSPs and organizations who want to scale their security offerings.

Preempt Security

Preempt Security

The Preempt Platform delivers adaptive threat prevention that continuously preempts threats based on identity, behavior and risk.

Fujitsu

Fujitsu

Fujitsu is the leading Japanese global information and communication technology company, offering a full range of products, solutions and services including Managed IT Services and Cyber Security.

Pentagon Group

Pentagon Group

Pentagon Group is a provider of security services in high-risk environments, remote areas and emerging markets in support of land-based, aviation, maritime and cyber operations.

Cyfirma

Cyfirma

CYFIRMA offers Cyber threat visibility and intelligence suite and services aimed at keeping your organization’s cybersecurity posture up-to-date.

TeraByte

TeraByte

TeraByte is an information security company which helps to educate and protect businesses from cyber security related risks.

Korn Ferry

Korn Ferry

Korn Ferry is a global organizational consulting firm, synchronizing strategy and talent to drive superior performance for our clients in key areas including cybersecurity.

Corellium

Corellium

Corellium are dedicated to supporting our peers in the ARM community who seek to build more secure, performant, and accessible software and devices.

Police CyberAlarm

Police CyberAlarm

Police CyberAlarm is a free tool to help members understand and monitor malicious cyber activity. This service is made up of two parts; monitoring and vulnerability scanning.

Zeva

Zeva

Zeva solves complex identity and encryption challenges for the federal government and corporations around the globe.

Sentra

Sentra

Sentra is focused on improving data security practices within the cloud, mitigating the risks of damaging data leaks by providing comprehensive visibility into critical data assets.

ECIT

ECIT

ECIT is your preferred provider of finance and IT services. We believe in the value of combining financial and IT services to streamline and improve the operation of your business.

RightCue Assurance

RightCue Assurance

RightCue Assurance identify opportunities for improvement in the Information Security for your organisation and work with you to reduce cyber risk.