News

2017-02-03

Stuxnet, Secrecy & The New Era of Cyber War

Should Cyber weapons be subject to international controls & protocols in the same way as nuclear and some other conventional weapons?

2017-02-06

Business Can Minimise Cybersecurity Risks And Drive Profit

CIOs are under pressure to deliver on the promise of digital technologies to transform customer-facing services & internal processes.

2017-02-03

Spanish Police Arrest Banking Malware Suspect

Spanish police have arrested a Russian programmer suspected of developing the Neverquest banking Trojan.

2017-02-01

New Technology To Really Close The US / Mexican Border

Despite President Trump’s executive orders to extend walls along the US-Mexico border, real border security will likely take longer than he thinks.

2017-02-01

True Extent Of UK Cybercrime & Fraud Revealed

The Crime Survey for England and Wales shows an estimated 3.6 million cases of fraud and 2 million computer misuse offences in a year.

2017-02-06

Artificial Intelligence Gives Business Wings

Solutions powered by AI will displace jobs with the biggest impact felt in transportation, logistics, customer service & consumer services.

2017-02-01

Emerging Details Of Cyber Assault On A Major UK Bank

Lloyds Bank admits it was was the target of a recent cyber attack which blocked a substantial number of customers using their online accounts.

2017-02-03

Ransomware- Practical Advice To Protect & Recover Using Free Tools

There are concrete strategies & commercial tools available to use to protect yourself against ransomware attacks. By Dinesh Kumar Aggarwal

2017-01-30

Directors Report January 2017. Cyber Security Checklist For Management (£)

Cyber attacks are increasing and they are becoming both more focused and more damaging, targeting sensitive financial & commercial data.

2017-01-30

Hacker, Tailor, Soldier, Spy: Future Cyberwar

Lights Out: Someone wants the power down. Someone is sowing chaos and waiting to take advantage. This is how a cyber war begins.

2017-01-30

Director's Departure Leaves A Big Hole At GCHQ

The early departure of Robert Hannigan as UK’s GCHQ chief, marks not so much the end of an era as the transition between eras.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Secmentis

Secmentis

Secmentis is a cyber security consultancy specializing in penetration testing, threat intelligence, and proactive defense for your IT infrastructure.

Cyber8Lab

Cyber8Lab

Cyber8Lab provides cybersecurity training programmes simulating real world cybersecurity incidents such as web defacement, malware, phishing, digital forensics analysis and wireless intrusion.

Omada

Omada

Omada is a leading provider of IT security solutions and services for identity management and access governance.

Intertrust Technologies

Intertrust Technologies

Intertrust Technologies is a software company specializing in trusted computing products and services.

PROOF

PROOF

PROOF is a Brazilian leader in cybersecurity. Our goal is to assist our Customers in managing security efficiently and in tune with business needs.

Data Destruction London

Data Destruction London

Data Destruction London offers fast, confidential and compliant expert data destruction services to businesses and organisations in London.

CM Blockchain Security Center

CM Blockchain Security Center

We are dedicated to building a healthier blockchain ecosystem, providing solutions to security technology, and helping those who practice in the area of blockchain to get insight into industry trends.

Rogers Cybersecure Catalyst

Rogers Cybersecure Catalyst

Rogers Cybersecure Catalyst helps Canadians and Canadian companies seize the opportunities and tackle the challenges of cybersecurity.

Brimondo

Brimondo

At Brimondo we help you to maximize and protect your brand value by being a proactive and strategic partner within brand protection with experts within intellectual property and digital assets.

Netacea

Netacea

Netacea provides a revolutionary bot management solution that protects websites, mobile apps and APIs from malicious attacks such as scraping, credential stuffing and account takeover.

DAtAnchor

DAtAnchor

Anchor is simply a better way to protect and control sensitive data. Zero-trust, data-centric security. Simplified.

Fullstack Academy

Fullstack Academy

A trailblazer in bootcamp education, Fullstack Academy prepares students for fulfilling careers in tech through our NYC campus, online learning, and university partnerships.

Otto

Otto

Stop Client-Side Attacks. Plug otto into your application security suite and protect your supply chain.

Cognisys Group

Cognisys Group

Cognisys provides cyber security penetration testing and compliance services from its offices in Leeds and Manchester.

Vertek

Vertek

Vertek is a leading provider of operations consulting, end-to-end business process outsourcing, business intelligence, software applications and managed cybersecurity solutions.

RST Cloud

RST Cloud

RST Cloud is a cutting-edge technology company that specialises in threat intelligence solutions for businesses of all sizes.