News

2016-10-12

Strategies For A Culture of Cyber-Security

Information security can be an overwhelming concept to grasp, but it's vital to protecting your sensitive business data.

2016-10-11

Islamic State Cyber Attacks

Recent convictions show that IS make a very real national security cyber threat that results from the combination of terrorism & hacking.

2016-10-10

IoT 2.0: The Internet of Things-to-Things

Once just basic sensors collecting business data for operational tasks, now, the IoT is making connections across the value chain.

2016-10-05

Otto: Uber Acquires Self-Driving Lorry Startup

Uber is fast diversifying beyond its core business. Self- driving technology for large goods vehicles is the latest on the shopping list.

2016-10-08

The Internet Is No Place For Elections

Political scientists and technical experts are saying public elections should stay offline. US Citizens cannot trust the internet with their vote.

2016-10-07

IBM’s Real -Time Cloud Platform For Financial Services

IBM has announced a new service called Financial Transaction Manager which will allow commercial banks to deploy real-time payments.

2016-10-05

Five Technologies Changing Our lives In Five Years

Analysts say a handful of technologies are poised to change our lives by 2021. What are they?

2016-10-05

Ever-Evolving Trojan Devices Infects Android Systems

The Trojan known as Android.Xiny continues to evolve and has gained the ability to infect a core Android system process.

2016-10-04

Cybersecurity Start-Ups Working With GCHQ

The UK's top security startups are invited to work with GCHQ in an effort to help protect against hackers and cyber attackers.

2016-10-04

Difficult: Attracting Women To Cybersecurity

Fighting Stereotypes: Women make up only 10% of the global cybersecurity workforce.

2016-10-04

State Sponsored Hackers: Finding The Country Behind The Attack

Security experts don't just want to know how a cyber attack happens, but what country the attack is coming from.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Irish Reporting & Information Security Service (IRISS)

Irish Reporting & Information Security Service (IRISS)

IRISS-CERT is Ireland's first CSIRT (Computer Security Incident Response Team) to provide services to all users within Ireland.

GFI Software

GFI Software

GFI Software works with System Administrators, IT Professionals and IT Executives to ensure that their IT infrastructures are monitored, managed, secured and compliant.

Okta

Okta

Okta is an enterprise-grade identity management service, built from the ground up in the cloud to address the challenges of a cloud-mobile-interconnected world.

CERT-EU

CERT-EU

CERT-EU is a permanent Computer Emergency Response Team for the EU institutions, agencies and bodies.

XenArmor

XenArmor

XenArmor products include NetCertScanner, an enterprise software to scan & manage expired SSL Certificates on your local network or internet.

One Identity

One Identity

One Identity delivers identity governance, access management, and privileged account management solutions that facilitate and secure your digital transformation.

CryptTalk

CryptTalk

CryptTalk is an easy-to-use secure communication service.

Aveshka

Aveshka

Aveshka is a professional services firm focused on addressing complex threats and challenges including Cybersecurity and Information Technology.

Jumio

Jumio

Jumio’s end-to-end identity verification and authentication solutions fight fraud, maintain compliance and onboard good customers faster.

Syskode Technologies

Syskode Technologies

Sykode Technologies is a next-generation global technology company offering an integrated portfolio of advisory services, products and solutions in areas including AI, IoT and Cyber Security.

Heidrick & Struggles International

Heidrick & Struggles International

Heidrick & Struggles is a premier provider of leadership consulting and senior-level executive search services for roles including Information & Technology Officers and Cybersecurity.

CYBRScore

CYBRScore

CYBRScore is a premium, performance-based cyber skills training and assessment provider that quantifies a user’s ability to defend a network.

Prikus Tech

Prikus Tech

Prikus is a full-fledged Cyber Security Company helping organizations worldwide to manage cyber risks. We offer Risk & Compliance Services, Security Testing & Managed Security Services.

Verinext

Verinext

Verinext delivers transformative business technology, from intelligently automating time-consuming tasks and protecting data assets to securing infrastructure and improving customer experiences.

Benchmark Executive Search

Benchmark Executive Search

Benchmark specializes in finding elite talent for startup, emerging-growth and mid-cap companies offering game-changing technologies or innovative services to the federal and commercial markets.

SecuCenter

SecuCenter

Secucenter is a trusted partner for SOC services, offering security expertise in a cost-effective way.