News

2016-08-02

Cyber Attacks On Banks Prompt New Regulatory Safeguards

US regulators are worried that the surge in frequent, aggressive digital breaches could cripple the entire financial system.

2016-08-02

Cyber Threats & Nuclear Weapons

The spread of cyber weapons and their information-warfare capabilities, are challenging conventional thinking about nuclear weapons.

2016-08-01

Was The Internet Created In A Bar?

There are several different versions of how, where and by whom the Internet was created. Here's one. Two men walk into a bar....

2016-08-01

Network SecurityAnd The Importance Of “Defense in Depth”

IT departments have the constant dilemna of whether it is more important to prioritize securing the network, or their endpoints.

2016-07-30

Close The Talent Gap - $10m Cisco Cybersecurity Scholarship Fund

Finding – and keeping – the cybersecurity talent required for today’s digital economy is a serious challenge. And it’s getting worse. Cisco have a plan...

2016-07-29

AI Defeats Human Fighter Pilots

The new AI, called ALPHA runs on cheap desktop PC and can outperform and beat human pilots in combat simulations.

2016-07-29

What To Look For In A Security Consultant

Running a secure business means achieving organisational priorities in a fast-evolving landscape. This requires anticipation & adaptability.

2016-07-23

UK Parish Councils Can Get Website Construction Funding

UK Parish Councils have an electronic opportunity to connect their local community by using the Internet and government to pay for their website.

2016-07-28

ISIS Warn That London 'next to be attacked'

Open Source Intelligence: London is on the next list of target cities for a jihadi outrage attack

2016-07-28

Mining Bitcoin Just Halved

Bitcoin just experienced a major milestone in its short little life-span.

2016-07-28

Major Privacy Win For Microsoft in 'free for all' Data

The US government cannot force Microsoft to give authorities access to the firm's servers located in other countries, a court has ruled.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Netrix

Netrix

Netrix is a Mexican company specialized in IT Security, with more than 18 years of experience in Managed Services, Professional Services and Turnkey Solutions related to Security.

Maximus Consulting (MX)

Maximus Consulting (MX)

Maximus designs and delivers corporate-wide information security management system with our full-time IRCA Accredited consulting team.

K2 Cyber Security

K2 Cyber Security

K2 Cyber Security delivers the Next Generation Application Workload Protection Platform to secure web applications and container workloads against sophisticated attacks.

Siemens

Siemens

Siemens Industrial Security Services provide solutions for cybersecurity in automation environments based on the recommendations of the international standard IEC 62443.

ValueMentor

ValueMentor

ValueMentor is a leading cyber security service provider in the Middle East. We enable clients to reduce risk by taking a strategic approach to cybersecurity.

LibraSoft

LibraSoft

Librasoft creates solutions to protect information from external and internal threats.

Cyber Security Operations Consulting (CyberSecOp)

Cyber Security Operations Consulting (CyberSecOp)

CyberSecOp is an ISO 27001 Certified Organization which provides cyber security operations services and risk management consulting.

DeVry University - Cyber Security Degree

DeVry University - Cyber Security Degree

Explore the dynamic world of data protection with a hybrid or online cyber security degree specialization with DeVry's IT & Networking Bachelor's Degree.

IN4 Group

IN4 Group

IN4 Group is a skills, innovation and start-up services provider that specialises in supporting businesses with the training, communities, networks and advice they need to scale.

Sure Valley Ventures

Sure Valley Ventures

Sure Valley Ventures is an entrepreneur led venture capital fund focused on helping software entrepreneurs grow and scale businesses that will have a global impact.

ZINAD IT

ZINAD IT

ZINAD is an information security company offering state-of-the-art cybersecurity awareness products, solutions and services.

StrongBox IT

StrongBox IT

Strongbox IT provides solutions to secure web applications and infrastructure.

PixelQA

PixelQA

Are you looking for a security testing company to cross-check whether your software or mobile app has a possible security threat or not?

Astute Technology Management

Astute Technology Management

Astute Technology Management helps businesses take control of their technology and work with greater confidence.

Rootly

Rootly

Rootly is an incident management platform on Slack that helps automate manual admin work during incidents.

HEAL Security

HEAL Security

HEAL Security is the global authority for cybersecurity data, research and insights across the healthcare sector.