News

2016-09-26

Staff Training 'Not enough to stop most data breaches'

Companies leave themselves wide open to cyber-attacks due to staff negligence. Training alone is not sufficient to change risky employee behaviour.

2016-09-23

Why Spear-Phishing Hacks Are So Successful

Exploiting poor security. Tracking with spyware. Creating fake employees. It's all about information gathering.

2016-09-23

New Cyber Tricks Make ISIS Sophisticated

Terror attacks in Europe have killed more than 200 people in the past 20 months, showing IS has a new operational discipline & technical acumen.

2016-09-23

Terror Threat In 2016 Worse Than 2001

Fifteen years after the 9/11 attack, the battle against terrorism is far from over. The threat today is worse than the one confronted in 2001.

2016-09-22

Are Cyber Breaches The New Norm?

Normal: The first half of 2016 saw 538 known breaches; 60 percent of businesses losing valuable IP and approximately 13m records exposed.

2016-09-21

Social Media Sites - Cyber Weapons of Choice

Facebook, LinkedIn and Twitter can't secure their own environments, let alone yours. It's time to sharpen your security know-how.

2016-09-21

How Will Terrorists Use The Internet of Things?

What is the future for the IoT, when smart refrigerators can be used in DDOS attacks and LED lightbulbs can communicate?

2016-09-21

Tesla Announces Update To Self-Driving System

Tesla is updating its semi-autonomous driving system Autopilot with new limits on hands-off driving.

2016-09-21

A New Autonomous Tactical Drone

No Pilot. No GPS: The drone flies into a building and autonomously maps its interior using cameras, lasers, inertial & ultrasonic sensors.

2016-09-20

Special Report: CEOs And IT Innovation (£)

SPECIAL REPORT: CEOs And IT Innovation Our CEO/CIO research exposes some of the significant transformation issues organisations are facing in the new Digital Economy.

2016-09-21

You Have Big Data, Or Perhaps Just Too Much Data?

There is more data available to organisations today than ever before. Is it all really useful?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

QinetiQ

QinetiQ

QinetiQ is one of the world's leading defence technology and security companies. Areas of activity include air, land, sea and space systems, weapons, robotics, C4ISR and cyber security.

Perkins Coie LLP

Perkins Coie LLP

Perkins Coie LLP is an internationalk law firm with offices across the USA and Asia. Practice areas include Privacy and Data Security.

Portnox

Portnox

In 2007, Portnox set out to create one of the world’s easiest to use, most loved, value-driven network security solutions — and our customers will tell you we’ve succeeded.

L J Kushner & Associates

L J Kushner & Associates

L.J. Kushner is a leading Information Security recruiting firm.

LEXFO

LEXFO

LEXFO specializes in the security of information systems, assisting clients in protecting information assets using an offensive and innovative approach.

Cyber Triage

Cyber Triage

Cyber Triage is an automated incident response software any company can use to investigate their network alerts.

European Recruitment

European Recruitment

European Recruitment is an award-winning, international recruitment agency specialising in niche technology areas including Cyber Security.

TeachPrivacy

TeachPrivacy

TeachPrivacy provides computer-based privacy and data security training that is engaging, memorable, and understandable.

CSO GmbH

CSO GmbH

CSO GmbH provide specialist consultancy services in the area of IT security.

limes datentechnik

limes datentechnik

limes datentechnik is an authority in the fields of cryptography and data compression. The FLAM product family is an internationally accepted standard for efficient and safe handling of data.

i-Sprint Innovations

i-Sprint Innovations

i-Sprint is a leader in Securing Identity and Transactions in the Cyber World for industries that are security sensitive.

Very Good Security (VGS)

Very Good Security (VGS)

VGS is the modern approach to data security. Our SaaS solution gives you all the benefits of interacting with sensitive and regulated data without the liability of securing it.

Conference Index

Conference Index

Conference Index provides an indexed listing of upcoming meetings, seminars, congresses, workshops, summits and symposiums across a wide range of subjects including Cybersecurity.

GitGuardian

GitGuardian

Enable developers, ops, security and compliance professionals to enforce security policies across public and private code, and other data sources as well

African Cyber Security

African Cyber Security

African Cyber Security and it's partners, have the expertise and skills to provide holistic solutions for companies, institutions and government.

Sentor Managed Security Services

Sentor Managed Security Services

Sentor Managed Security Services is a cybersecurity company that enables organizations to exist in a digitally connected world.