News

2017-08-23

What Is A Good Cyber Strategy?

Cybersecurity has never been more important for business. Cyber-attacks are becoming ever more ambitious and a systematic response is needed.

2017-08-31

You Might Need To Hire AI Expertise Sooner Than You Think

It is fast becoming a vital part of IT strategy and to make the most of AI in the enterprise, you have to have a strong team in place.

2017-08-24

Cyber Security Risks Of Cloud Computing

The global cloud market is expected to grow to $190+ billions by 2020. Increased cloud adoption calls for better understanding of cloud security threats.

2017-08-23

HBO Offers Hackers $250,000 'bug bounty'

HBO reportedly offered $250,000 in ransom to the group that hacked its servers under the guise of a “bug bounty”.

2017-08-22

Chinese Satellite Sends Hack-Proof Messages

The Micius communications satellite has successfully sent "hack-proof" messages using quantum encryption.

2017-08-14

Ukrainian Postal Service Hit By Cyber Attack

Ukraine's national postal service has been hit by a two-day-long cyber-attack targeting its online system that tracks parcels.

2017-08-22

Artificial Intelligence: A Warning

Elon Musk repeats his warning about the dangers of AI, saying it poses “vastly more risk” than the apparent nuclear capabilities of North Korea does.

2017-08-21

Loss Of Cyber Expertise Is A Problem For Trump

The Trump administration has lost significant individuals serving in top cybersecurity roles across the federal government. That's a problem.

2017-08-21

Fighting Digital Crime: Evolving Police Methods

As the cyber-crime landscape continues to evolve, methods of policing it must change as well.

2017-08-21

N. Korea Will Unleash Cyber Attacks On The US

US officials are increasingly concerned the rogue regime will respond to international pressure by lashing out with a weapon it has already mastered.

2017-08-18

Can Tech Solve The Brexit Border Puzzle?

Can technology create 'frictionless borders' so that importers and exporters will hardly notice any change when the UK separates from the EU?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Pen Test Partners LLP

Pen Test Partners LLP

Pen Test Partners provides penetration testing, security assessment and training services.

Skkynet Cloud Systems

Skkynet Cloud Systems

Skkynet is a leader in real-time data systems for the secure management and control of industrial processes (SCADA) and embedded devices (M2M).

SecurityScorecard

SecurityScorecard

SecurityScorecard provides the most accurate security ratings & continuous risk monitoring for vendor and third party risk management.

ISARA Corp

ISARA Corp

ISARA Corporation is a security solutions company specializing in creating class-defining quantum-safe cryptography for today's computing ecosystems.

Cyber Forensic & Investigation (CFI)

Cyber Forensic & Investigation (CFI)

Cyber Forensic & Investigation (CFI) is recognized as Thailand’s leader in cyber investigations and digital forensics.

Safetica

Safetica

Safetica Technologies is a Czech software company that delivers data protection solutions for businesses of all types and sizes.

Leadcomm

Leadcomm

Leadcomm is a Brazilian company focused on the distribution and integration of IT systems and security solutions for large companies.

CloudOak

CloudOak

CloudOak is a cloud channel provider for hybrid cloud Backup as a Service (BaaS), Disaster Recovery as a Service (DRaaS) and Archiving to Small to Medium Business (SMB).

Keyless Technologies

Keyless Technologies

Simple, secure, and interoperable authentication. Keyless offers unmatched security, privacy and usability, while reducing risk and infrastructure costs.

RapidScale

RapidScale

RapidScale’s managed cloud solutions provide reliable, innovative, and secure services, all complete with white-glove service and full management options.

Peraton

Peraton

Peraton provides innovative solutions for the most sensitive and critical programs in government today, developed and executed by scientists, engineers, and other experts.

Enea

Enea

Enea is one of the world’s leading specialists in software for telecommunications and cybersecurity. Our products are used to enable services for mobile subscribers, enterprise customers and IoT.

Vaultinum

Vaultinum

Vaultinum are a trusted independent third party specialized in the protection and audit of digital assets.

Zyber 365

Zyber 365

Zyber 365 are providing a robust, decentralized, and cyber-secured operating system which adheres to the fundamental principles of environmental sustainability.

Red Maple Technologies

Red Maple Technologies

Started and run by engineers from the UK Intelligence and Defence communities, Red Maple is a technical consultancy and product company.

SecurityLoophole

SecurityLoophole

SecurityLoophole is an independent cyber security news platform with global coverage. Latest updates, reports, news and events related to cyber security.

BARR Advisory

BARR Advisory

At BARR Advisory, we build trust through cyber resilience. We help protect the world’s data, people, and information networks through a human-first approach to cybersecurity and compliance.