News

2016-03-18

Why Do We Fall For Online Scams?

Scams are big business. It is becoming increasingly difficult to keep up with the range of scenarios being used to con people out of their money.

2016-03-14

Brand Reputation Includes Cyber Safety

Marketing collects tons of Big Data and, in the simplest terms, if malicious actors get to your data, your brand can be tarnished.

2016-03-16

Data Security Puts Innovation At Risk

As the challenge of protecting users, applications & data against cyberattack grows, organisations are struggling to innovate whilst staying secure.

2016-03-15

Communications Breakdown: CISOs & Company Boards

We Don't Talk Anymore: Chief Information Security Officers (CISO) and the board of directors don't adequately share cybersecurity threat information.

2016-03-15

Who Is Winning The Cyber War?

Who is winning the cyber war - the criminals and hackers or the network and system defenders? The State of Cybersecurity: 2016.

2016-03-14

Recovered IS Document Reveal 22,000 Recruits

Secret Islamic State documents naming 22,000 jihadist fighters including 16 Britons intercepted by German intelligence.

2016-03-14

Google's AI Machine To Battle 'Go' Champion

Master of the ancient Asian board game Go will sit down to defend humanity against Deep Mind.

2016-03-14

China Cracks Down On Top Hong Kong Newspaper

Firewall Censorship: Social media accounts of the South China Morning Post suspended and the media group's news websites blocked in China.

2016-03-11

Apple’s Best Defence Against The FBI Is The One It Can’t Admit

Some say the debate over privacy embodied in Apple v FBI conceals the problem that iPhone already has backdoors which Apple hasn’t yet closed.

2016-03-18

UK Bosses - Heads In The Sand Over Cybercrime

Clear evidence of the growing threat is still not causing British businesses leaders to increase their protection.

2016-03-19

Underwater Drone Technology Could Doom Trident

New technologies, both unmanned underwater vehicles (UUV) and advanced sensors, could make the world’s oceans “transparent” to submarines.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Coalfire

Coalfire

Coalfire specialises in cyber risk management and compliance. Our services span the cybersecurity lifecycle from advisory and compliance, to testing and engineering, monitoring and optimization.

ITrust

ITrust

ITrust develops breakthrough products in Cyber/Artificial Intelligence, offering its products in Europe, America and Africa through its partner network (VAR, MSSP, OEM).

Cleafy

Cleafy

Cleafy are a team of fraud hunters, cybersecurity experts, data scientists, and software engineers. Our purpose is to make people’s life easier and free from the threats in the digital ecosystem.

Efecte

Efecte

Efecte is a Nordic SaaS company specialized in IT Service Management, Self-Service, Identity Management and Access Governance solutions.

Network Integrity Systems

Network Integrity Systems

Network Integrity Systems is a leader in network infrastructure security and offers solutions specifically developed for Government and Private Enterprise.

OSIRIS Lab - NYU Tandon

OSIRIS Lab - NYU Tandon

The Offensive Security, Incident Response & Internet Security Lab (OSIRIS) is a security research environment where students analyze and understand how attackers take advantage of real systems.

TechGuard Security

TechGuard Security

TechGuard Security was founded to address national cyber defense initiatives and US critical infrastructure security.

Repulsa

Repulsa

Repulsa provides state-of-the-art, patented, fast filtering with over 700 million malicious IP addresses and over 30 million categorized site listings updated daily.

Athreon

Athreon

Athreon utilizes a fusion of AI technology, human interpretation, and the latest in cybersecurity to deliver sound business solutions that help our clients make better data-driven decisions.

ArmorCode

ArmorCode

ArmorCode's intelligent application security platform gives us unified visibility into AppSec postures and automates complex DevSecOps workflows.

OneLayer

OneLayer

OneLayer provide enterprise grade security dedicated for private LTE/5G networks. We ensure that the best IoT security toolkit is implemented in your cellular environment.

Eqlipse Technologies

Eqlipse Technologies

Eqlipse Technologies provides products and high-end engineering solutions to customers in the Department of Defense and Intelligence Community.

Ironblocks

Ironblocks

Ironblocks is a pioneering cybersecurity firm that specializes in delivering comprehensive, end-to-end security solutions for the rapidly evolving Web3 ecosystem.

Converged Communication Solutions

Converged Communication Solutions

Converged is an independent Internet Service Provider, telephony, IT support and security specialist.

CyberEPQ

CyberEPQ

CyberEPQ (Cyber Extended Project Qualification) is the UK’s first and only Extended Project Qualification in Cyber Security.

SecuCenter

SecuCenter

Secucenter is a trusted partner for SOC services, offering security expertise in a cost-effective way.