News

2017-01-30

Cyberwar: How Prepared Is Nepal?

Vulnerable: The main reason Nepal has become a target for cyber attackers is the chaos and confusion caused by a big earthquake.

2017-01-30

How Much Cyber Insurance Is Enough?

How a top security manager feels about cyber insurance often may have a lot to do with the type of company he or she works for.

2017-01-25

GCHQ Wants Teenage Girls To Join The Cybersecurity Fight

Teenage girls who spend time online and on social media could become the UK's spies of the future. Or so Britain's intelligence agency hopes.

2017-01-27

Twelve Things To Know About Self Driving Cars

From forecourt to scrapyard, a new car in the UK lasts an average 13.9 years. If you were to buy a new one today, it might be the last you ever buy.

2017-01-27

MI6 Used Information From The Trump Dossier

MI6 used information gathered by ex-agent Christopher Steele in his Trump investigation to warn against Russian cyberattacks.

2017-01-25

Facebook To Introduce Fake News Tools

Facebook is introducing new tools in Germany to help combat the spread of fabricated news stories before the parliamentary elections.

2017-01-25

Give Robots Human Status

The EU parliament wants regulations to govern the use of robots and AI, including a form of “electronic personhood”.

2017-01-25

Anonymous To Trump: You will ‘Regret’ Next 4 Years

Scary? Anonymous, the loose collective of online hackers, has issued an ominous warning to the new President, Donald Trump.

2017-01-27

Populism & Terror Have Killed Geopolitics

Populist politics and extremism promoted on social media are undermining conventional approaches to international relations. Opinion by Taha Ozhan

2017-01-24

Cyber Attack Concerns Ahead Of French Elections

'No political party can say that their systems are seriously secured': France fears foreign interference in the imminent Presidential elections.

2017-01-23

Electoral Influence: 40yrs Of Kremlin Interference

Russian attempts to influence the US presidential election outcome should cause no surprise. It is traditional. Opinion By Prof. Christopher Andrew.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Sophos

Sophos

Sophos is a worldwide leader in next-generation cybersecurity, protecting more than 400,000 organizations of all sizes in more than 150 countries from today’s most advanced cyberthreats.

Joe Security

Joe Security

Joe Security specializes in the development of automated malware analysis systems for malware detection and forensics.

CANVAS Consortium

CANVAS Consortium

The CANVAS Consortium aims to unify technology developers with legal and ethical scholar and social scientists to approach the challenges of cybersecurity.

SECURITYMADEIN.LU

SECURITYMADEIN.LU

SECURITYMADEIN.LU is the main online source for cyber security in Luxembourg providing news, information and a toolbox of cyber security solutions.

Smokescreen

Smokescreen

Smokescreen's IllusionBLACK employs deception technology to detect, deflect and defeat advanced hacker attacks.

Dual Layer IT Solutions

Dual Layer IT Solutions

Dual Layer offer a full range of IT Services and Solutions for businesses from IT infrastructure design to cloud/hosted solutions, cybersecurity, disaster recovery and IT training.

CYQUEO

CYQUEO

CYQUEO is your professional partner and system integrator. We secure your organization against advanced cyber threats.

DarkOwl

DarkOwl

DarkOwl provides the world’s largest index of darknet content and the tools to efficiently find leaked or otherwise compromised sensitive data.

Alias Robotics

Alias Robotics

Alias Robotics is a robot cyber security company. We deliver cyber security solutions for robots and robot components.

Kobalt.io

Kobalt.io

Kobalt are bringing the monitoring capabilities of enterprise-class security teams to smaller organizations.

Bright Data

Bright Data

Bright Data Inc is the world’s #1 web data platform, enabling organizations to research, monitor, analyze data, and make better decisions.

The Cyber Guild

The Cyber Guild

The Cyber Guild is a not-for-profit organization working to improve the understanding and practice of cybersecurity, and to help raise awareness and education for all.

Central Intelligence Agency (CIA)

Central Intelligence Agency (CIA)

The CIA is an independent agency responsible for providing national security intelligence to senior US policymakers. This includes cyber security related activities.

Infosec Institute

Infosec Institute

Infosec is a leading cybersecurity training company, we help IT and security professionals advance their careers with skills development and certifications.

Endor Labs

Endor Labs

Endor Labs gives developers and security teams the context they need to prioritize open source risk.

ABPSecurite

ABPSecurite

ABPSecurite is a leading value-added distributor and a network performance solutions provider.