News

2016-06-21

Your Next Security Analyst Will Probably Be A Computer

Human security analysts are the bottleneck in security operations.

2016-06-22

Artificial Intelligence And Racism

Racism’s subtle influence can be unexpectedly powerful.

2016-06-21

Twitter Blocks Data Access By US Spy Agencies

Twitter has banned US intelligence agencies from using it's Dataminr alert service.

2016-06-21

ISIS Developing Driverless Cars

Islamic State in Syria (ISIS) technicians are working to develop a Google-style driverless car that could navigate itself.

2016-06-20

US Nuclear Weapons Controlled by 8in Floppy Disks

The US military’s nuclear arsenal is controlled by computers built in the 1970s that still use 8in floppy disks.

2016-06-20

Facial Recognition Prevents Terrorist Attacks

Facial recognition systems need both images and a searchable database. Advances in Iris scanning technology make this process easier.

2016-06-19

Iran Wants To Collect All Social Network Data

The Iranian government wants tighter controls on all foreign messaging and social media apps operating in the country.

2016-06-19

The Use Of Intelligent Deception in Cyber Security

Hackers only need to be successful once, while organizations protecting sensitive information need to successfully thwart threats every day.

2016-06-19

FTSE Company Boards Struggle with Cybersecurity Management

KPMG find that half of boards only hear about cybersecurity risk occasionally - either bi-annually or when something has gone wrong.

2016-06-17

The Death of the Password Is Upon Us

The traditional password is losing its foothold as the standard in authentication.

2016-06-17

Son Of Stuxnet: Irongate Malware

Newly discovered malware targeting industrial control systems has the researchers who discovered it intrigued.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Roka Security

Roka Security

Roka Security is a boutique security firm specializing in full-scale network protection, defending against advanced attacks, and rapid response to security incidents.

InnoSec

InnoSec

InnoSec is a software manufacturer of cyber risk management technology.

Intersec Worldwide

Intersec Worldwide

Intersec Worldwide is a boutique Information Security Firm specializing in PCI Compliance, Assessment, Remediation, Forensics, Data Breach Investigations, Incident Response and IT Managed Services.

IAC

IAC

IAC is a specialist Irecruitment consultancy covering Internal Audit, Risk, Controls, Governance, IT Audit, and Cyber Security roles.

Mosaic 451

Mosaic 451

Mosaic451 is a bespoke IT managed services provider and consultancy specializing in information security, operations and design.

CloudVector

CloudVector

CloudVector's API Detection & Response platform is the only API Threat Protection solution that goes beyond the gateway to provide Shadow API Prevention and Deep API Risk Monitoring and Remediation.

Randstad

Randstad

Randstad provide outsourcing, staffing, consulting and workforce solutions in the USA across a wide range of job sectors including IT and cybersecurity.

M12

M12

M12 (formerly Microsoft Ventures) is the corporate venture capital subsidiary of Microsoft.

Slice

Slice

Slice offer subscription based Cyber Insurance for small businesses.

Newberry Group

Newberry Group

The Newberry Group provides comprehensive IT services and solutions that optimize operations, minimize risk and deliver measurable business value.

SecSign Technologies

SecSign Technologies

SecSign Technologies delivers user authentication, messaging, file sharing, and file storage with next generation security for company networks, websites, platforms, and devices.

Cyturus Technologies

Cyturus Technologies

Cyturus Technologies delivers cybersecurity business risk quantification services using our proprietary Adaptive Risk Model (ARM).

LayerX Security

LayerX Security

LayerX's user-first browser security platform turns any browser into the most protected & manageable workspace, by providing real-time monitoring and governance over users’ activities on the web.

Hushmesh

Hushmesh

Hushmesh is a start-up aimed at securing the world’s digital infrastructure by developing develop the Mesh, a global information space with automated security built in.

Innov8tif

Innov8tif

Innov8tif is an AI company specialised in providing ID assurance solutions — helping digital businesses to prevent frauds by verifying and authenticating customers identity.

Razilio

Razilio

Razilio is a boutique cybersecurity consultancy located in Sydney, Australia and serving the world.