News

2017-04-26

Drones, Satellites And Cyber Warfare

Israel is the new prototype of a 21st century superpower, not in size, but rather in innovation and efficiency to adapt to the changes in warfare.

2017-04-26

AI Might Be The Ultimate Answer To Cyber Threats

Things like Firewalls and Antivirus are obsolete. Organisations are searching for technologically advanced means of protecting their crucial data.

2017-04-26

Time To Speak The Language Of Risk

Cybersecurity is changing from a technical problem to being a risk-based issue. Security leaders stuck in reactive mode who do not adapt will fail.

2017-04-26

North Korea More Likely To Launch A Cyber Attack Than A Military Strike

US Homeland Security are more concerned about a stealthy cyber attack on critical infrastructure than missiles from the Korean peninsular.

2017-04-25

Cybercrime Is A Growing Threat To Small Business

Companies that are the victims of cybercrime and data breach suffer significant costs which can lead to bankruptcy for SMEs.

2017-04-25

The New Face of Cybersecurity

Phishing, spear-phishing, whaling, ransomware, hacking, hacktivism, corporate espionage. Attacks are becoming more insidious and sophisticated.

2017-04-25

UK Airports & Nuclear Power Stations On Cybersecurity Alert

UK security services have issued a series of alerts warning that terrorists may have developed ways of bypassing safety checks.

2017-04-25

Google’s Fact Checking News

Google follows Facebook and is to start displaying fact-checking labels in its search results in an attempt to combat fake news.

2017-04-24

A Geneva Convention For Cyber War

Unlike conventional conflict, there are no rules of play for cyber attacks. Is it time countries started talking about this nascent form of warfare?

2017-04-24

Targeted Ransomware Attacks Are Focusing On Business

Cyber criminals are increasingly turning their attention from attacks against private users to targeted ransomware attacks against businesses.

2017-04-24

Luxembourg: A Prime Target For Cyber Attack

Who is it that is trying to hack Luxembourg's government and businesses and what are they looking for?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Digital Shadows

Digital Shadows

Digital Shadows is a cyber threat intelligence company that helps clients discover sensitive data exposed through social media, cloud services and mobile devices

NCC Group

NCC Group

NCC Group is a global cyber and software resilience business operating across multiple sectors, geographies and technologies.

Zymr

Zymr

Zymr specialize in cloud computing solutions including Cloud Security, Cloud Mobility, Cloud Apps, Cloud Infrastructure and Cloud Orchestration.

Segusoft

Segusoft

With its encryption platform SEGULINK, Segusoft provides standard software for companies to securely transfer files and messages.

Vintegris

Vintegris

Vintegris are a Certification Authority and manufacturer of innovative systems and applications for the full cycle of digital identity.

Newtech Recycyling

Newtech Recycyling

Newtech Recycyling specializes in the removal and disposal of IT infrastructure which has reached the end of its life cycle.

DataSixth Security Consulting

DataSixth Security Consulting

DataSixth delivers Cybersecurity Intelligence. With our unique capabilities, we’re able to deliver value, deliver answers, and deliver actionable security intelligence.

Nomios

Nomios

Nomios develops innovative solutions for your security and network challenges. We design, secure and manage your digital infrastructure.

Tech Vedika

Tech Vedika

Tech Vedika has access to technical guidance, training and resources from AWS to successfully undertake solution architecture, application development, application migration, and managed services.

Intelligent CloudCare

Intelligent CloudCare

Intelligent CloudCare, a division of IPS, is a full IT Services provider serving the needs of SMBs in the metropolitan New York City region.

Apex Systems

Apex Systems

Apex Systems is a world-class technology services business that incorporates industry insights and experience to deliver solutions that fulfill our clients’ digital visions.

Casepoint

Casepoint

Casepoint is the legal technology platform of choice for corporations, government agencies, and law firms to meet their complex eDiscovery, investigations, and compliance needs.

Thunder Shield Security

Thunder Shield Security

Thunder Shield is a professional cyber security service provider of penetration test, source code review and security assessment services.

Trickest

Trickest

Trickest enables Enterprises, MSSPs, and Ethical Hackers to build automated offensive security workflows from prototype to production.

Clumio

Clumio

Clumio provides autonomous backup and recovery for critical cloud data.

Adili Group

Adili Group

Adili Group is a leading pan-African corporate advisory firm. We deliver tailored solutions in regulation and compliance, risk management, and improving business efficiency.