News

2016-05-11

SpyEye Masterminds Begin 24 Year Sentence

SpyEye banking malware caused losses of nearly $1 billion and infected over 50 million computers. Two jailed, one still at large.

2016-05-10

Cyber "Best Practices" Are About To Change

The solution to our cyber crisis is not as difficult to understand as most people think. Opinion by Christopher Murphy

2016-05-13

Pentagon Wants to ‘Fingerprint’ The World’s Hackers

DARPA plans to track hackers to create “algorithms for developing predictive behavioral profiles,” linking malicious activity to individuals.

2016-05-10

Automated Malware Analysis Central to Defense Strategies

Research firm Forrester are hailing automated malware analysis as a big step forward in network security.

2016-05-12

No Phone Is Safe from Hackers & Spies

The illusion of privacy: Hackers only need your phone number in order to listen in on phone calls, read texts or track your geographic location.

2016-05-30

Pushing Back Sexism - A New Era For Women In Technology.

Women are challenging global technology companies and empowering themselves and each other to be safer online.

2016-05-10

CyberScape – The Growing Influence of Cyber Threats (£)

Cyber issues have entered most of the areas of any organisation’s systems and often, routine working methods and communications.

2016-05-10

Cyber Stalking: It's Real & Potentially Deadly (£)

When a “digital issue” became a real life danger.

2016-05-09

Cyber Revolution: A Big Step Change Business Leaders Need To Understand (£)

A revolution is taking place that compares to the Agricultural and the two earlier Industrial Revolutions and for many senior directors and strategic policy managers this has not yet been fully understood.

2016-05-10

Important IT Security Requirements For Business Leaders (£)

The implementation of cyber security skills and IT security departments have significantly increased in the last eighteen months and it has become an important issue that business directors and especially CEOs, Financial Directors and of course CIOs and IT Directors need to fully understand.

2016-05-09

US National Intelligence Director Says Snowden Hastened Encryption By 7 Years

James Clapper says Snowden has had an accelerator effect on commercially available encryption, making it much harder to track terrorists.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Digital Gurus Recruitment

Digital Gurus Recruitment

Digital Gurus provide specialist recruitment services in areas including IT and information security

Sonatype

Sonatype

Sonatype protects the world's enterprise software from security, compliance, licensing risks, while reducing application development and deployment time.

CERT-EU

CERT-EU

CERT-EU is a permanent Computer Emergency Response Team for the EU institutions, agencies and bodies.

Foundation Futuristic Technologies (FFT)

Foundation Futuristic Technologies (FFT)

FFT is a global leader in computer forensics and digital investigation solutions.

Intertek Group

Intertek Group

Intertek Group provides Assurance, Testing, Inspection and Certification services. Activities include cybersecurity testing and certification.

Netwrix

Netwrix

Netwrix empowers information security and governance professionals to identify and protect sensitive data to reduce the risk of a breach.

Wüpper Management Consulting (WMC)

Wüpper Management Consulting (WMC)

Specialized in compliance, risk management and holistic information security WMC GmbH has longtime implementation experience in global projects.

Zen360Consult

Zen360Consult

Zen360Consult provides Advisory and Training services in the field of Cyber Resilience, which includes Cyber Security /ISMS and Business Continuity.

CybernetIQ

CybernetIQ

CLAW by CybernetIQ is the industry's most advanced SOAR platform helping unify all cybersecurity tools under one umbrella and providing organizations faster, better and more accurate cybersecurity.

RapidScale

RapidScale

RapidScale’s managed cloud solutions provide reliable, innovative, and secure services, all complete with white-glove service and full management options.

Patriot Cyber Defense

Patriot Cyber Defense

Patriot Cyber Defense is a Cyber Security and Management Consulting professional services firm.

SightGain

SightGain

SightGain is the only integrated risk management solution focused on cybersecurity readiness using real-world attack simulations in your live environment.

TekSynap

TekSynap

TekSynap is a full spectrum Information Technology services provider to federal government agencies.

GLIMPS

GLIMPS

GLIMPS-Malware automatically detects malware affecting standard computer systems, manufacturing systems, IOT or automotive domains.

Truvantis

Truvantis

Truvantis is a cybersecurity consulting organization providing best-in-class cybersecurity services to secure your organization’s infrastructure, data, operations and products.

Progress Partners

Progress Partners

Progress Partners is a corporate advisory firm that works with buyers and sellers of emerging growth companies to complete M&A or private placement transactions. Our sectors include cybersecurity.