News

2017-04-12

Mike Rogers Wants To Buy Cyber Weapons 'Off The Shelf'

The NSA & US Cyber Command chief is thinking of going to the private sector to buy the next generation of ready- made cyber weapons.

2017-04-12

ISPs Can Tell Users About Infected Computers

ISPs can spot malicious patterns of activity over the Internet and even pinpoint the IP addresses that are being used for cybercrime.

2017-04-11

Cloudbleed Is Just The Latest Internet Security Disaster

A tiny coding bug has led to an unknown quantity of data, passwords, personal information, messages & cookies, to leak all over the Internet.

2017-04-11

Google Lawsuit Could Be Fatal For Uber

With a $70bn valuation, Uber has won victories against regulators, taxi companies and many competitors. Now they face a challenge from Google.

2017-04-10

Four Steps To Managing Cyber Security Better

Company boards have a pressing fiduciary responsibility, to promote & support development of robust cybersecurity programmes.

2017-04-10

Geolocation, Russian Hackers & False Flag Operations

Experts at ICIT say malicious actors can easily position their breach so that it can be attributed to Russian state-sponsored hackers.

2017-04-10

ENISA’s Threat Rankings: From Malware To Cyber Spies

Europe's computer security agency has set out a list of the top online threats with a warning that hacking for profit is the biggest trend.

2017-04-10

US Buys Mysterious ISIS Drone Killer

The US Air Force is trying to counter small armed drones and is testing multiple technologies and systems to counter deadly ISIS UAVs in Mosul.

2017-04-10

Trump Administration's Policy On Cybersecurity

'If you're not thinking of cyber first, I don't know what you should be thinking about.' Increased spending on surveillance & encryption.

2017-04-08

Are Employees Your Weakest Link When It Comes To Security?

Your technology could have every safety feature and yet a lack of employee education could instantly compromise all of that. By Jane Frankland

2017-04-07

London Conference: Protecting Critical Infrastructure

SGG- Global: The Cybersecurity Protecting Critical Infrastructure Conference. 16th-17th May 2017 London

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Snow Software

Snow Software

Snow Software is changing the way organizations think about their technology investments, empowering IT and business leaders to drive transformation with precision and agility.

Center for Identity - University of Texas at Austin

Center for Identity - University of Texas at Austin

The mission of the Center is to deliver the highest-quality discoveries, applications, education, and outreach for excellence in identity management, privacy, and security.

Wüpper Management Consulting (WMC)

Wüpper Management Consulting (WMC)

Specialized in compliance, risk management and holistic information security WMC GmbH has longtime implementation experience in global projects.

mPrest

mPrest

mPrest is a global provider of mission-critical monitoring and control solutions for the defense, security, utility and Industrial Internet of Things (IoT) sectors.

CyberProof

CyberProof

CyberProof aims to give clarity and confidence to businesses worldwide using a new risk-based approach to cyber security services.

Agility Networks

Agility Networks

Agility Networks is a technology company providing integrated services and solutions for Digital Transformation and Cyber Security.

Project Moore

Project Moore

Project Moore is an Amsterdam law firm specialising in IT-law and privacy.

Accelerator Frankfurt

Accelerator Frankfurt

Accelerator Frankfurt is an independent go-to-market program focused on Fintech, Cybersecurity and Digital B2B startups.

Secure-IC

Secure-IC

Secure-IC provide end-to-end, best-of-breed security expertise, solutions, and hardware & software technologies, for embedded systems and connected objects.

Angoka

Angoka

Angoka provide hardware-based solutions for managing the cybersecurity risks inherent in machine-to-machine communication networks.

Appsian Security

Appsian Security

Appsian provides powerful solutions that help organizations take control of their business critical data and financial transactions.

Avetta

Avetta

Avetta One is the industry’s largest Supply Chain Risk Management (SCRM) platform. It enables clients to manage supply chain risks and suppliers to prove the value of their business.

FastNetMon

FastNetMon

FastNetMon is a very high performance DDoS detection and mitigation tool which could detect malicious traffic in your network and immediately block it.

EdgeWatch

EdgeWatch

EdgeWatch is a platform that helps information accredited security practitioners discover, monitor, and analyze devices that are accessible from the Internet.

Centric Consulting

Centric Consulting

Centric Consulting is an international management consulting firm with unmatched expertise in business transformation, AI strategy, cyber risk management, technology implementation and adoption. 

Price Forbes

Price Forbes

Building on more than 100 years of specialist insurance broking, Price Forbes partner with clients around the world who are looking to understand and balance today’s risk and plan for the future.