News

2017-05-02

Snowden Can Stay In Russia For As Long As He Likes

The former NSA contractor has been living in Russia since 2013, after leaking thousands of classified intelligence documents and fleeing the US.

2017-05-02

EU / US Privacy Shield Affects Your Organisation

Although we live in a world where data transfer is easier from a technical standpoint, location is increasingly important from a legal perspective.

2017-05-01

Teenagers And Cybercrime

More teenagers are getting involved in cybercrime. Many do it for fun without realising the consequences, but the penalties can be severe.

2017-05-01

Get Ready: Robots Will Destroy Jobs

Robotics promises to be the most profoundly disruptive technological shift since the industrial revolution.

2017-04-28

Over 60% Of UK Businesses Lack Any Real Cyber Security

Cyber Security Breaches Survey 2017: Virtually all UK businesses surveyed are exposed to some kind of cybersecurity risk.

2017-04-28

US Intelligence Agencies Fear Insiders As Much As Spies

Forget about spies. It's rogue insiders that cause heartburn at US intelligence agencies these days.

2017-04-27

Fake Police Ransomware Scam

Cyber criminals used JavaScript to trick Apple Safari web users into believing that their devices were compromised by police ransomware.

2017-04-26

Drones, Satellites And Cyber Warfare

Israel is the new prototype of a 21st century superpower, not in size, but rather in innovation and efficiency to adapt to the changes in warfare.

2017-04-26

AI Might Be The Ultimate Answer To Cyber Threats

Things like Firewalls and Antivirus are obsolete. Organisations are searching for technologically advanced means of protecting their crucial data.

2017-04-26

Time To Speak The Language Of Risk

Cybersecurity is changing from a technical problem to being a risk-based issue. Security leaders stuck in reactive mode who do not adapt will fail.

2017-04-26

North Korea More Likely To Launch A Cyber Attack Than A Military Strike

US Homeland Security are more concerned about a stealthy cyber attack on critical infrastructure than missiles from the Korean peninsular.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Radisys

Radisys

Radisys offers software, products, integrated systems, and professional services for communication service providers and telecom solution vendors.

Quotium

Quotium

Quotium provides automated testing technologies to make business software applications secure and robust.

Infiltrate

Infiltrate

INFILTRATE is a deep technical conference that focuses entirely on offensive security issues.

Viavi Solutions

Viavi Solutions

Viavi Solutions is a global leader in both network and service enablement and optical security performance products and solutions.

Virgil Security

Virgil Security

Virgil Security provides easy-to-deploy and easy-to-use cryptographic software and services for use by developers and end-users.

CyberPrism

CyberPrism

CyberPrism provides SaaS solutions using proprietary technology, underpinned by industry-leading technical practitioners to protect OT within Government, Maritime and Industrial markets.

IronNet Cybersecurity

IronNet Cybersecurity

IronNet’s product and services provide enterprise-wide security management and visibility of your network, users and assets.

Global EPIC

Global EPIC

Global EPIC is an international cybersecurity initiative designed to combat growing world challenges by facilitating global collaboration in the field of cyber security.

Satori Cyber

Satori Cyber

The Satori Cyber Secure Data Access Cloud is the first solution on the market to offer continuous visibility and granular control for data flows across all cloud and hybrid data stores.

Servian

Servian

Servian is one of Australia's leading IT consultancies, with expertise in cloud, data, machine learning, DevOps and cybersecurity.

Kocho

Kocho

Kocho (formerly TiG) is a provider of identity and access, cyber security, cloud transformation, and managed IT services.

Swiss It Security Group

Swiss It Security Group

Swiss It Security Group offers clients complete IT security concepts based on innovative solutions and technology, with a focus on protection, detection and defence.

Certihash

Certihash

Certihash have developed the world’s first blockchain empowered suite of information security tools based on the NIST cybersecurity framework.

Babble

Babble

Babble is a Unified Comms, Contact Centre and Cyber Solutions provider. We believe in making next-generation technology simple to use, deploy and manage.

Infima Cybersecurity

Infima Cybersecurity

INFIMA tackle the hard parts of managing your Security Awareness Training program so you can focus elsewhere.

Mitra Informatics Integration (MII)

Mitra Informatics Integration (MII)

Mitra Informatics Integration is the information communication technology solution business of the Metrodata Group.