News

2016-12-16

Self - Flying Aircraft Take To British Skies

A pilotless plane is being prepared for testing in UK airspace to help refine systems that control autonomous aircraft.

2016-12-13

Five Biggest Data Breaches In History (That We Know About)

Data Loss is up 30% in the first 6 months of 2016 and Identity Theft is now the favourite tactic for hackers and cyber criminals. Here are 5 big ones.

2016-12-12

Snowden Worried That He'll Face Prison Or Execution If Russia Sends Him Home.

From safety in Moscow, Snowden says he has no regrets about blowing the whistle on the NSA but admits he's worried about being handed over to the US.

2016-12-09

Facebook, Microsoft, Twitter & YouTube: Collaborating To Remove Terrorist Content

Social media heavyweights announce they will cooperate on a plan to help limit the spread of terrorist content online.

2016-12-08

Rise Of The Machines

The Institute for Critical Infrastructure Technology (ICIT) say the Mirai Botnet attack on Dyn was just a rehearsal for an even bigger event.

2016-12-08

Next 3 Years Most Critical Of All For Technology

About 40% of CEOs think they will be running a completely different entity in the next three years.

2016-12-08

Banks Plan To Hoard Bitcoins

Big banks planning to stockpile bitcoins in order to pay off cyber criminals who threaten to bring down their critical IT systems.

2016-12-07

Just How Safe Is Online Banking?

Banking online is convenient, but how can you you protect against your accounts being emptied by fraudsters? Here is some useful advice.

2016-12-07

Yes, Russia Weaponised Social Media In The US Elections

Russia didn't just hack & leak documents from US political groups, it used social media as a weapon to influence perceptions about the election.

2016-12-07

Half The World's Population Is Not Yet On The Internet.

Room For Growth: More than half of the world's population still isn't using the Internet.

2016-12-07

What Are The Big Cyber Threats In 2017?

It looks like 2016 will be remembered as the year of the data breach and several obvious threats are likely to feature next year.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Secure Forum

Cyber Secure Forum

The Cyber Secure Forum is a premier cybersecurity event dedicated to bringing together experts, and professionals to explore the latest trends, share knowledge, and discuss strategies.

Lynxspring

Lynxspring

Lynxspring provides edge-to-enterprise solutions and IoT technology for intelligent buildings, energy management, equipment control and specialty machine-to-machine applications.

Phirelight Security Solutions

Phirelight Security Solutions

Phirelight empowers an enterprise to easily understand how their networks behave, while at the same time assessing and managing cyber threats in real time.

Uniwan

Uniwan

Uniwan is an IT services company specializing in networking and security.

Navaio IT Security

Navaio IT Security

Navaio helps clients with IT Security related challenges with a primary focus on Identity and Access Management, Data Governance, User Awareness and Cyber Resilience Services.

Absolute IT Asset Disposals

Absolute IT Asset Disposals

Absolute IT Asset Disposals is an IT asset disposal (ITAD) company providing safe and secure recycling of IT assets.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Huntress Labs

Huntress Labs

Huntress provides managed threat detection and response services to uncover and address malicious footholds that slip past your preventive defenses.

Chicago Quantum Exchange (CQE)

Chicago Quantum Exchange (CQE)

Chicago Quantum Exchange is an intellectual hub and community of researchers with the common goal of advancing academic and industrial efforts in the science and engineering of quantum information.

Larsen & Toubro Infotech (LTI)

Larsen & Toubro Infotech (LTI)

LTI is a global technology consulting and digital solutions company with operations in 33 countries.

Alpha Omega Integration

Alpha Omega Integration

Alpha Omega creates new possibilities through intelligent end-to-end mission-focused government IT solutions.

Policy Monitor

Policy Monitor

Policy Monitor is a cyber security company founded by experts with extensive experience in operational and risk management.

Schillings

Schillings

Shillings defends your rights to privacy, reuptation and security. We fight passionately against breaches of your privacy, attacks on your reputation and threats to your security.

Aembit

Aembit

Aembit is the Identity Platform that lets DevOps and Security manage, enforce, and audit access between federated workloads

Multipoint Group

Multipoint Group

Multipoint is an information security and protection solutions company operating in the South EMEA region through value-added distribution channels.

VeriBOM

VeriBOM

VeriBOM is a SaaS security and compliance platform that helps protect you and your customers through automation, documentation, and transparency for every software application you build or run.