News

2016-03-14

Directors & Senior Management Cyber Report (£)

Business need more electronic security, thoughtful analysis and consideration given to potential commercial risk & opportunities than ever.

2016-03-14

Data Analysis & CRM For 2016 (£)

Data Analysis & CRM For 2016

2016-03-14

A Brief Explanation Of Malware (£)

A Brief Explanation Of Malware

2016-03-14

PR & Press After An Attack (£)

PR & Press After An Attack

2016-03-14

Six Things Every Board Member Should Know About Cyber Security (£)

Commercial Security and Cyber Security are no longer just IT problems - they are Business Critical (premium subscribers)

2016-03-14

Your Directors Don’t Understand Cyber Threats Endangering Business (£)

Most of your Directors don’t understand the Cyber Threats that endanger Business.

2016-03-15

Hard Lessons From The Cyberattack On Ukraine

Investigation into cyberattacks that caused rolling blackouts in Ukraine reveal how vulnerable power suppliers are to malware.

2016-03-15

Russian Scientists Have Solved Light-Based Computers

High-performance microprocessors that harness photons rather than electrons promise to make computers up to a thousand times more efficient.

2016-03-14

Cybersecurity Skill Shortage Has Industry Worried

Years of massive hacker attacks on industry & government has led to a surge in cybersecurity jobs outpacing the supply of people to fill them.

2016-03-18

Fighting The Invisible War In CyberSpace

Cyberattacks can damage critical infrastructure, steal government secrets and even retaliate against private companies for political reasons.

2016-03-15

China’s Quantum Satellite Changes Cryptography

China is fast becoming a world leader in quantum communications technology.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

SCADAhacker

SCADAhacker

SCADAhacker provides mission critical information relating to industrial security of SCADA, DCS and other Industrial Control Systems.

Rubicon Workflow Solutions

Rubicon Workflow Solutions

Rubicon is a leading provider of managed IT support and strategic services, specialising in creative and mixed platform environments.

Telia Cygate

Telia Cygate

Cygate are specialists in information security, data networks, and data centre and cloud technologies.

BitRaser

BitRaser

BitRaser serves your needs for a managed & certified data erasure solution that can support internal & external corporate audit requirements with traceable reporting.

Nozomi Networks

Nozomi Networks

Nozomi Networks is a leader in Industrial Control System (ICS) cybersecurity, with a comprehensive platform to deliver real-time cybersecurity and operational visibility.

CYE

CYE

Utilizing data, numbers, and facts, CYE helps security leaders know what business assets are at risk and execute cost-effective remediation projects for optimal risk prevention.

Trinity Cyber

Trinity Cyber

Trinity Cyber’s patent-pending technology stops attacks before they reach internal networks,reducing risk and increasing cost to adversaries.

iosiro

iosiro

iosiro was created to guide companies through securely using blockchain technologies. We help teams launch and manage ICOs, deploy secure dApps, and integrate private networks into business practices.

Infosec Global

Infosec Global

Infosec Global provides technology innovation, thought leadership and expertise in cryptographic life-cycle management.

eSec Forte Technologies

eSec Forte Technologies

eSec Forte Technologies is a CMMI Level-3 ISO 9001-2008, 27001-2013 certified global consulting and implementation company focused on Information Security and Cyber Security.

KT Secure

KT Secure

KTSecure’s mission is to provide proven and productive cyber security solutions and managed services, backed by our highly qualified and passionate team of experts.

Tide Foundation

Tide Foundation

Tide's breakthrough multi-party-cryptography enables TRUE-zero-trust technology that unlocks cyber-herd immunity.

Gradient Cyber

Gradient Cyber

Gradient Cyber is a trusted cybersecurity partner specializing in small businesses and mid-market enterprises concerned about cybersecurity but lacking the staff to give it the attention it deserves.

Flexxon

Flexxon

Flexxon is the industry leader to develop NAND flash storage devices. Our key focus is to innovate memory devices ensuring data security and reliability.

Minorities in Cybersecurity (MiC)

Minorities in Cybersecurity (MiC)

MiC was developed out of a unique passion to help fill the gap that exists in the support and development of women and minority leaders in the cybersecurity field.

Capzul

Capzul

Capzul are transforming the network security landscape with a new approach; creating virtually impenetrable networks, precluding cybercriminal attacks on your network ecosystem.