News

2017-07-05

Cybersecurity Is Too Important To Leave To IT

Management experts say that breaking down the corporate silos that keep IT and HR apart is a matter of urgency.

2017-07-05

Ukraine Police Trace Petya Attack Source

A vulnerability within an obscure piece of Ukrainian accounting software is the root cause of the massive Petya cyberattack.

2017-07-04

Cyberwar: A New Front For US Military

Cyber warfare is a game changer in how to assess enemies, meet their challenges and enact policies that match the growth of the cyber domain.

2017-07-03

Latest: All About Petya

The current Petya infestation spreads as rapidly and indiscriminately as WannaCry did, but it's better crafted and more dangerous.

2017-07-04

VR Systems Will Change US Navy Training

Virtual Reality and light detection technologies are about to change the way the US Navy prepares for war.

2017-07-03

Three Ways To Prepare Your Business For GDPR

The UK will apply the EU General Data Protection Regulation which comes into force next year on May 25th 2018. Get ready.

2017-07-03

Hacking A Chip With A Wave of Your Hand

Electro-magnetic fault injection hacking works and soon it will become important to protect electronic device components from non-invasive hacks.

2017-07-03

Ten Years Since The Outbreak Web War One

Estonia was the first victim of cyberwar and a decade later we are still grappling with the new era of increasingly sophisticated digital weapons.

2017-07-03

App Or Browser: Which Is Safer For Online Banking?

If you need to make a transaction on the go banking apps ought to be more secure than browsers, but it isn’t necessarily so.

2017-07-03

Urgent: Investment In NHS Cybersecurity

The Health Service in Scotland needs urgent investment to update legacy systems & preparedness.

2017-06-30

Petya Cyber Attack Update

“Petya” ransomware has caused serious disruption at large firms and paying the ransom does not work. Take defensive action.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Blue Frost Security

Blue Frost Security

Blue Frost Security provides high-level IT security consulting, penetration testing services, ISO 27001 Solutions, PCI compliance solutions and training.

Sophos

Sophos

Sophos is a worldwide leader in next-generation cybersecurity, protecting more than 400,000 organizations of all sizes in more than 150 countries from today’s most advanced cyberthreats.

iXsystems

iXsystems

iXsystems is a leader in Open-Source enterprise server and storage solutions including Backup & Recovery to protect critical data.

Teradata

Teradata

Teradata is a leading provider of enterprise big data analytics and services. Applications include Cyber Security Analytics.

Shadowserver Foundation

Shadowserver Foundation

Shadowserver Foundation aims to improve internet security by raising awareness of compromised servers, malicious attackers and the spread of malware.

RedLock

RedLock

The RedLock Cloud 360TM platform correlates disparate security data sets to provide a unified view of risks across fragmented cloud environments.

Skurio

Skurio

Skurio create cost-effective, intuitive and powerful Cloud based solutions to identify threats, detect data breaches outside the network and automate the response.

SolutionsPT

SolutionsPT

SolutionsPT enables customers to strengthen their Operational Technology (OT) network to meet the ever increasing demand for performance, availability, connectivity and security.

Axence

Axence

Axence provides professional solutions for the comprehensive management of IT infrastructure for companies and institutions all over the world.

SecureLayer7

SecureLayer7

SecureLayer7 is an international provider of integrated business information security solutions with an innovative approach to IT security.

Cyberwatch Finland

Cyberwatch Finland

Cyberwatch Finland's services improve decision-makers’ strategic situational picture and enable successful holistic cyber risk management.

Maxxsure

Maxxsure

Maxxsure provides a platform for executive management, leveraging proprietary technology that identifies, measures, and scores a company’s cyber risks.

Digital Intelligence

Digital Intelligence

Digital Intelligence offer a full array of products, forensic and e-discovery consulting services and training.

Technology Mindz

Technology Mindz

Technology Mindz is a leading provider of cybersecurity services. We offer a wide range of services to help businesses. Our services are Identity and access management, Governance risk and compliance.

Calamu

Calamu

Calamu is a software-defined storage security and resiliency platform that keeps your data secure and accessible wherever you choose to store it.

Camelot Secure

Camelot Secure

Camelot Secure Secure360 platform is a holistic redefinition of what world-class cybersecurity strategies can be. Prepare. Protect. Deploy.