News

2017-07-25

The Impact Of AI On Employment Demands New Thinking

The challenge of protecting traditional jobs from the impact of globalisation will be further complicated by the effects of AI and automation.

2017-07-19

US Needs To Get Its Data Ready For GDPR

The GDPR harmonises data privacy laws, empowers EU citizens’ data privacy and will reshape organisations' approach to data privacy.

2017-07-25

Guide to Russian Infrastructure Hacking

Which of the numerous Russian hacker groups has been attempting to hack the US power generation infrastructure?

2017-07-24

The Insider Threat

The biggest single threat to data security is already inside the building and insider threats can be especially hard to guard against.

2017-07-24

Google Wants To Mimic The Human Brain

Google is proposing a template for creating a single machine learning model that can address multiple tasks, emulating human intelligence.

2017-07-20

Russia Suspected As Hackers Breach Power Plant Systems

Hackers working for a foreign government have breached at least a dozen US power plants, searching for vulnerabilities in the electrical grid.

2017-07-21

Cyber Attacks Demonstrate Why The Cloud Is Safer

Both WannaCry and Petya ransomware attacks are a reminder of why the cloud is a safer place to store critical data.

2017-07-21

Ukraine Accuses Russia Of Ransomware Attack

Ukraine has formally accuses Russia of launching cyber attacks, disrupting the work of public &private institutions by locking down their databases.

2017-07-19

British Businesses Are Unaware Of Data Protection Laws

Almost two-thirds of British businesses are unaware they could face fines of up to €20million with the introduction of GPPR.

2017-07-19

Find Your Digital Risk

A comprehensive assessment of your digital risk starts with knowing where to find it; the Dark Web is a good place to start looking.

2017-07-19

Half Of US Firms Do Not Buy Cyber Insurance

A full 50% of US firms do not have cyber risk insurance and 27% of US executives say their firms have no plans to take out a cyber policy.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Vertical Structure

Vertical Structure

Vertical Structure services include Security & Penetration Testing, Information Assurance, Bespoke Training Programs and Secure Hosting.

Cigniti Technologies

Cigniti Technologies

Cigniti Technologies provides Independent Software Testing (IST) Services including software security testing.

Cato Networks

Cato Networks

Cato connects your branch locations, physical and cloud datacenters, and mobile users into a secure and optimized global network in the cloud.

CompliancePoint

CompliancePoint

We design and implement strategies, processes & procedures to mitigate risk, reach compliance goals, protect data assets, and meet industry standards.

Applied Risk

Applied Risk

Applied Risk is an established leader in Industrial Control Systems security, focused on critical infrastructure security and combating security breaches that pose a significant threat.

QA

QA

QA is a leading IT training provider in the UK with over 1,500 courses covering all areas of IT including Cyber Security.

Orchestra Group

Orchestra Group

Orchestra Group offer a unique integrated cybersecurity defense platform with proactive security policy management and enforcement orchestration.

ITTAS

ITTAS

ITTAS is a multidisciplinary company specializing in information security and software and hardware protection software.

Sevco Security

Sevco Security

Sevco Delivers Real-time Asset Intelligence to Identify and Close Unknown Security Gaps.

8com

8com

8com is an established Managed Security Service Provider (MSSP) with over 75 employees and customers in over 40 countries.

Balance Theory

Balance Theory

Balance Theory provides the knowledge infrastructure and collaboration center for the cybersecurity community. A networked community to build better cybersecurity outcomes.

IBM Security

IBM Security

IBM manufactures and markets computer hardware, middleware and software, and offers hosting and consulting services in areas ranging from mainframe computers to nanotechnology.

Prembly

Prembly

Prembly are a compliance and security infrastructure company.

PingSafe

PingSafe

PingSafe is creating the next-generation cloud security platform powered by attackers' intelligence, providing coverage for vulnerabilities that traditional security solutions would otherwise overlook

IT-Schulungen.com / New Elements GmbH

IT-Schulungen.com / New Elements GmbH

Under the name IT-Schulungen.com, the Nuremberg-based New Elements GmbH has been operating one of the largest training centres in the German-speaking world for over 20 years.

Verosint

Verosint

Verosint (formerly 443ID) provides real-time account fraud prevention that reveals fraudsters hiding in user accounts and proactively blocks them before their attacks can cause harm.