News

2016-03-08

Many Organisations Are Too Lax About Mobile Data Threats

Mobile devices can be a critical part of any cyber attack and mobile data breaches are more common than you might think.

2016-03-08

US Military Are Doubling Down On Robot Wars

The US military are investing heavily in a new generation of unmanned, autonomous weapons.

2016-03-07

Canada Cuts 5 Eye Intelligence Sharing

Canada slams on the brakes on sharing some communications intelligence out of fear that Canadians' personal information is unprotected.

2016-03-09

Reduce Risk With Threat Intelligence

Do you want to be more proactive in managing risk? What is the risk if you don’t pay attention to knowledge learned from previous events?

2016-03-07

Apple v FBI: The US Debates Privacy

Is there such a thing as security that is so good that it's a danger to society?

2016-03-04

8 in 10 IT Pros Believe Data Is Cloud Safer

Most professionals believe that when facing hardware malfunctions & environmental disasters, their data is safer in the cloud than on premises.

2016-03-04

Pentagon Starts Aggressive Cyberwar Against ISIS

The US military is ramping up its offensive cyberattacks on the Islamic militant group, targeting the group’s abilities to use social media.

2016-03-04

ISIS Hack The Wrong Google

Hackers affiliated with ISIS who promised to take down Google appear to have mistakenly attacked the wrong target.

2016-03-04

UK Government Goes Ahead With Revised Surveillance Bill

Its Back: The Home Office was made to revise the draft bill after concerns by legislators that it was too vague and did not protect privacy enough.

2016-03-01

Mobile And IOT Technologies Are Inside The Curve Of Human Time.

The leap from human time to computer time has relevance in business today. Opinion By Kevin Benedict

2016-02-29

Tor: Mystery Spike In Hidden Addresses

A security expert has noticed an unprecedented spike in the number of hidden addresses on the Tor network.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Fredda Stanza

Fredda Stanza

Fredda Stanza specialize in Information Security and Forensics Consulting.

Secure Identity Alliance (SIA)

Secure Identity Alliance (SIA)

The Secure Identity Alliance is dedicated to supporting sustainable worldwide economic growth and prosperity through the development of trusted digital identities and the adoption of secure eServices.

Radware

Radware

Radware is a global leader of application delivery and cyber security solutions for virtual, cloud and software defined data centers.

Kore Telematics

Kore Telematics

Kore is a leading managed service provider for IoT and M2M applications.

JPCERT/CC

JPCERT/CC

JPCERT/CC is the first Computer Security Incident Response Team (CSIRT) established in Japan.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Bugcrowd

Bugcrowd

As leaders in crowdsourced security testing, Bugcrowd connects companies and their applications to a crowd of tens of thousands of security researchers to identify critical software vulnerabilities.

Forensic Pathways

Forensic Pathways

Forensic Pathways focus on the provision of digital forensic technologies, offering clients unique technologies in the management of mobile phone data, image analysis and ballistics analysis.

StormWall

StormWall

StormWall is an Anti-DDoS protection service for websites and networks. We offer 100% protection from all types of DDoS attacks and 24/7 technical support.

Sergeant Laboratories

Sergeant Laboratories

Sergeant Laboratories builds advanced technologies to prove compliance in complex IT security and regulatory compliance situations.

Inspira Enterprise

Inspira Enterprise

Inspira Enterprise is a leading digital transformation company with expertise in Cyber Security, Internet of Things (IOT), Blockchain, Big Data & Analytics, Intelligent Automation and Cloud Computing.

David Hayes-Export Controls

David Hayes-Export Controls

David Hayes-Export Controls provides assistance to companies affected by export controls or who are considering entering the market but are unsure of the commercial and regulatory implications.

Creative ITC

Creative ITC

Creative ITC is a leading infrastructure and cloud enablement company. We design and deliver exceptional managed services and cloud solutions.

Infosec Institute

Infosec Institute

Infosec is a leading cybersecurity training company, we help IT and security professionals advance their careers with skills development and certifications.

RiverSafe

RiverSafe

RiverSafe is a professional services provider specialising in Cyber Security, Data Operations and DevOps, putting security at the heart of everything we do.

MARS Suite

MARS Suite

MARS Suite is your all-in-one solution for cyber protection & compliance. Cybersecurity and risk management is what we do best. And we’re making it simple and easy.