News

2017-06-20

The GDPR Effect On Brexit

Businesses in the UK will need to anticipate possible new barriers to data sharing whilst working to encourage pragmatic solutions.

2017-06-21

Trump Handed Russia Classified Intelligence

President Trump reportedly broke security protocol to tell Russian officials that Israel had successfully hacked ISIS computers.

2017-06-26

Apple's Driverless Cars

Apple CEO Tim Cook describes the challenge of building autonomous vehicles as “the mother of all” artificial intelligence projects.

2017-06-22

AI Meets Music’s Evolution

You hum it, I'll strum it. Artificial Intelligence has the potential to transform the ways in which music is created, played and performed.

2017-06-21

Advice For Cyber Insurance Buyers

Companies interested in securing cyber insurance should know that the underwriting process requires them to do careful due diligence.

2017-06-22

Power Companies Cyber ‘Nightmare’

CrashOverride: Seven minutes before midnight last December a bomb of sorts went off in a high voltage substation north of Kiev.

2017-06-21

Cybersecurity Can Learn From Maritime Security

The Internet is similar to the oceans and seas and cybersecurity crosses boundaries similar to drug smuggling and piracy.

2017-06-23

Binky: An Anti-Social Media Simulator

Flame-wars, bad news, fake news, worse news and anxiety-fueling comment sections mean that social media is no longer the escapism it once was.

2017-07-04

RBS Bank Warns Of Increased Cybercrime

Last year, there were more than 1.8million reported cases of financial fraud, with losses of more than £768million across Britain.

2017-07-03

News & Sports Websites 'vulnerable to attack'

News and sports websites have some of the lowest levels of security. Less than 10% use basic security protocols such as HTTPS and TLS.

2017-06-30

Chinese Criminals Are Selling Your Apple Data

A criminal operation run by employees of an Apple “domestic direct sales company and outsourcing company” has been uncovered in China.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Brookings Institution

Brookings Institution

The Brookings Institution is a nonprofit public policy organization. Cyber security is covered within the various study areas.

Prewen

Prewen

Prewen provide solutions to protect sensitive data across the organisation.

CyberPilot

CyberPilot

CyberPilot ApS is a Danish cybersecurity company. We work with all types of companies and organisations, both large and small, who want to achieve effective cybersecurity.

DomainTools

DomainTools

DomainTools helps security analysts turn threat data into threat intelligence.

Horangi

Horangi

Horangi provides security products and services that enable the rapid delivery of Incident Response and threat detection for our customers who lack the scale, expertise, or time to do it themselves.

CyberGhost

CyberGhost

CyberGhost is a Virtual Private Network services provider offering secure encrypted access to the internet.

Scanmeter

Scanmeter

Scanmeter helps identifying vulnerabilities in software and systems before they can be exploited by an attacker.

Micro Strategies Inc.

Micro Strategies Inc.

Micro Strategies provides IT solutions that help businesses tackle digital transformation in style.

European Healthcare Fraud & Corruption Network (EHFCN)

European Healthcare Fraud & Corruption Network (EHFCN)

EHFCN is the only organisation dedicated to combating fraud, corruption and waste in the healthcare sector across Europe.

NuCrypt

NuCrypt

NuCrypt is developing technology that is applicable to ultrahigh security data encryption as well as key distribution.

Etonwood

Etonwood

Etonwood specialises in infrastructure and vendor technology recruitment in areas including cloud platforms, cyber security and service management.

The Citadel Department of Defense Cyber Institute (CDCI)

The Citadel Department of Defense Cyber Institute (CDCI)

CDCI is established to address the critical national security needed for a skilled cybersecurity workforce.

HORNE

HORNE

HORNE is a professional services firm supporting clients in public, private & government sectors nationwide.

Information Technology Solutions (ITS)

Information Technology Solutions (ITS)

Information Technology Solutions is a single source provider for managing and securing mission-critical IT services.

Wing Security

Wing Security

Wing fosters a stronger security culture by engaging SaaS end-users and enabling easy communication with security teams.

Mother Technologies

Mother Technologies

From Datacentre to Desktop, Mother Technologies has been delivering IT Support, Telecoms, Cybersecurity and Connectivity services to businesses across Scotland and beyond since 2002.