News

2016-10-07

TalkTalk Penalised With A Record Fine

TalkTalk has been fined £400,000 for the severe security failings that led to the company being hacked in October 2015.

2016-10-07

Secret Arrest Of A National Security Agency Contractor

FBI agents investigate theft and disclosure of highly classified NSA computer code developed to hack into the networks of foreign governments.

2016-10-06

Yahoo Secretly Scanned Emails For US Intelligence

Last year Yahoo secretly built a custom software program to search all incoming emails for specific information provided by US intelligence agents.

2016-10-05

Something To Hide? Apple Will Share Your iMessages With The Police

Apple promises that your iMessage conversations are safe and out of reach from anyone other than you and your friends. Really?

2016-10-12

Cyber Attacks Do More Damage Than Physical Attacks

Previous Head the US Dept. of Homeland Security thinks that digital attacks are now more dangerous & damaging than physical attacks.

2016-10-12

AI Is Replacing Human Made Decisions In The US Military

A new survey of existing weapon systems finds that AI is increasingly used to replace humans, not just helping them.

2016-10-10

UK Cyber Highway Will Improve Security

The proposed UK Cyber Highway will give organizations the power to take control online of the Cyber Essentials certification process.

2016-10-13

A New Front In The Business Of Political Espionage

The days of spies trying to get their hands on state and trade secrets are still alive and well today. Except, now they’re digital.

2016-10-11

Lawyers Beware: A Robot Will Take Your Job

Well-tuned search engines could save junior legal professionals a lot of time and suffering. But where does human intelligence come in?

2016-10-05

The Dilemma Of Predictive Policing

How Police authorities respond to information gathered using computer modelling is at least as important as the predictions themselves.

2016-10-14

The Self-Fulfilling Prophecy Of Intelligent Automation

Intelligent automation is going through a rapid democratisation and should no longer be seen as a nightmare of unpredictable, threatening robots.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

SolarWinds

SolarWinds

SolarWinds as a worldwide leader in solutions for network and IT service management, application performance, and managed services.

Cyber Defense Initiative Conference (CDIC)

Cyber Defense Initiative Conference (CDIC)

Cyber Defense Initiative Conference (CDIC) is one of the most distinguished Cybersecurity, Privacy and Information Security Conference in Thailand and Southeast Asia.

Boldon James

Boldon James

Boldon James are market leaders in data classification and secure messaging software.

Governikus

Governikus

Governikus provides solutions for secure data transport, authentication, the use of electronic signatures and cryptography as well as for long-term storage.

PRESENSE Technologies

PRESENSE Technologies

PRESENSE Technologies specializes in monitoring and enforcing IT security policies at critical points in the network and on end systems.

Rublon

Rublon

Rublon protects endpoints, networks and applications by providing trusted access via two-factor authentication (2FA).

GuardSI

GuardSI

GuardSI was created to protect companies from growing threats to security such as fraud, hacking, internal theft, accidents and human mistakes that can directly affect the business.

Rizikon Assurance

Rizikon Assurance

Rizikon Assurance is an Online System that improves Third-Party Assurance and Risk Management, through efficiency, automation and better visibility.

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

GCSCC's work is focused on developing a framework for understanding what works, what doesn’t work and why – across all areas of cybersecurity capacity.

QuoIntelligence

QuoIntelligence

QuoIntelligence experts can help your team understand the evolving cyber threats and provide simple yet comprehensive recommendations so you can focus on what matters.

FYEO

FYEO

FYEO is a threat monitoring and identity access management platform for consumers, enterprises and SMBs.

Prism Infosec

Prism Infosec

Prism Infosec is an award-winning independent cyber security consultancy, CREST STAR, NCSC CHECK member, CAA ASSURE audit provider and PCI Qualified Security Assessor.

SE Ventures

SE Ventures

SE Ventures provides capital to big ideas and bold entrepreneurs who can benefit from Schneider Electric's deep domain expertise, R&D assets, and global customer base.

RSK Cyber Security

RSK Cyber Security

RSK Cyber Security are a leading cyber security services company that uses services, consulting, and product knowledge to lower security risk across the board.

GO Business

GO Business

GO Business are a specialised B2B team within GO that caters to the communication needs of the local business community in Malta.

Digital Encode

Digital Encode

Digital Encode is a leading consulting and integration firm that specializes in the design, management, and security of business-critical networks, telecommunications, and IT infrastructures.