News

2016-10-27

How To Win The Cyberwar Against Russia

Russia’s election-year hacking of the US political system is an unprecedented situation for the American national security establishment.

2016-10-27

Meet The Fancy Bears

A mysterious group of Russian hackers, known by several different names, are perpetrating a string of high profile and politically motivated hacks.

2016-10-27

Christmas Is Cancelled: EU Running A Big Cyberwar Simulation

With growing tension over domestic terror attacks as well as on the borders with Ukraine & the Baltic states, ENISA is gaming a Christmas cyberwar.

2016-10-25

Using The Internet Competitor Analysis Effectively (£)

The web is full of massive amounts of data and analysis that can be used to clarify and offer focus to your market space.

2016-10-25

Cyber Knowledge Management (£)

Create the new role of Chief Cyber Knowledge Management Officer (2CKMO) and make it part of your Strategy.

2016-10-25

Cyber Security Myths for SMEs (£)

The average cost of a data hack-attack is now costing a small/medium business around $3/5 million every attack and it is increasing annually.

2016-10-25

Strategies For A Cyber Security Culture (£)

Creating a culture of Cyber sensitivity is now a corporate/business priority that should be well understood and engaged with at the Board level.

2016-10-25

Who Is Trying To Disrupt The Internet?

A prolonged Internet outage affecting major sites raises a real concern that this is just a practice run for more widespread internet disruption.

2016-11-10

China’s Plan To Organise Society Using Big Data

Imagine a world where an authoritarian government monitors everything you do and awards you a score that measures your trustworthiness.

2016-11-10

Google’s Ad Tracking Is Just As Creepy As Facebook's

Google has changed the way it tracks its users across the internet, merging users' personal identity data across Gmail, YouTube without consent.

2016-10-12

Trickle Down Cybercrime

October is National Cyber Security Awareness and this week’s theme, cybercrime.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

RedTeam Security

RedTeam Security

RedTeam Security is a provider of Penetration Testing, Social Engineering, Red Teaming and Red Team Training services.

SSLGURU

SSLGURU

SSLGURU bring all of the major SSL certificate vendors to one market place in order to create the world's largest SSL store with the most competitive prices.

Cyber Secure Forum

Cyber Secure Forum

The Cyber Secure Forum is a premier cybersecurity event dedicated to bringing together experts, and professionals to explore the latest trends, share knowledge, and discuss strategies.

HorizonIQ

HorizonIQ

HorizonIQ (formerly Internap Corp / INAP) maximizes efficiency and innovation with flexible infrastructure solutions.

SwiftSafe

SwiftSafe

SwiftSafe is a cybersecurity consulting company providing auditing, pentesting, compliance and managed security services.

Gradcracker

Gradcracker

Gradcracker is THE careers website for Science, Technology (including Cybersecurity), Engineering and Maths university students in the UK.

Cyber Physical Security Research Center (CPSEC)

Cyber Physical Security Research Center (CPSEC)

CPSEC aims to contribute to the security enhancement of industrial infrastructure that creates value across cyber space and physical space.

Bolt Learning

Bolt Learning

Bolt's Cyber Security eLearning module provides users with an in-depth understanding of cybercrime, how it can occur and what everyone can contribute to preventing it.

Mindsight

Mindsight

Mindsight is a technology consulting firm with expertise from cybersecurity to cloud, disaster recovery to infrastructure, and collaboration to contact center.

Blackbird.AI

Blackbird.AI

Blackbird.AI provides an intelligence and early-warning system to help users detect disinformation and take action against threats.

ThreatReady Resources

ThreatReady Resources

ThreatReady reduces an organization’s risk by delivering cyber security awareness training based on the latest, state-of-the-art learning science to effectively drive long-term cyber-safe behavior.

tru.ID

tru.ID

We’re tru.ID, and we're reimagining mobile authentication, one API at a time.

WinMagic

WinMagic

At WinMagic, we’re dedicated to making authentication and encryption solutions that protect data without causing user friction so that everyone can work freely and securely.

Atlas VPN

Atlas VPN

Atlas VPN is a highly secure freemium VPN service with a goal to make safe and open internet accessible for everyone.

NetScout Systems

NetScout Systems

NetScout assures digital business services against disruptions in availability, performance, and security.

Cybertech Nepal

Cybertech Nepal

Cybertech Nepal is committed to provide high-quality cyber security solutions, including server assessment and hardening, forensics and malware analysis, end-point threat analysis, and VAPT.

ThreatNix

ThreatNix

ThreatNix is a tight knit group of experienced security professionals who are committed to providing competent cybersecurity solutions that adhere to international standards.

Digital Encode

Digital Encode

Digital Encode is a leading consulting and integration firm that specializes in the design, management, and security of business-critical networks, telecommunications, and IT infrastructures.