News

2015-11-11

Julian Assange: Google is Hillary Clinton's 'Secret Weapon'

A Google offshoot is building the infrastructure for personalized, data-driven election campaigning in the 2016 U.S Presidential race.

2015-11-10

Cyber Attack, CyberCrime, CyberWarfare – CyberComplacency

Reading List: An in-depth reference work covering Cyber Attacks from motivation, identification, analysis & mitigation. By Mark Osborne.

2015-11-10

British Police Want Access to UK's Entire Web Browsing History

Retention of weblog data for Police inspection is "perhaps the most contentious and confused aspect of communications data retention".

2015-11-10

A Threat No One Is Talking About - Attack On the Power Grid

The US power distribution system comprises three power grids generating electricity which are vulnerable to attack by a sophisticated hacker.

2015-11-10

Waging Cyberwar In Peacetime

The internet makes civilian targets the easiest to strike and in many instances causalities are not immediate.

2015-11-10

Drone Carrying Drugs Crashes at a US Prison

The first attempt to smuggle contraband into a prison with an unmanned aerial vehicle.

2015-11-09

U.S Tech Companies Shouldn't Give China Code

China has been asking US technology companies to share proprietary information, ostensibly for security purposes.

2015-11-09

IncuBus Ventures Teams Up with PwC to Offer the Future of Work Incubator Programme

London: IncuBus Future of Work incubator hosted by PwC is looking for disruptive cyber security startups.

2015-11-09

Can EU Judges Keep NSA Spying in Check ?

According to EU Justice Commissioner, the NSA's blanket surveillance of Europeans will be subject to judicial review.

2015-11-09

Bank of England Partners With US for Cyberattack Simulation

The Bank of England is set to simulate a major cyberattack in order to test the security protocols being employed by the finance industry.

2015-11-07

New UK Surveillance Bill Appears In The Wake of Snowden

Is the proposed new legislation a gross intrusion of privacy or a sensible anti-terrorism measure?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Bob's Business

Bob's Business

Bob's Business adopts a fresh approach to information security awareness and compliance training, delivering key information through the use of short animated movies.

Lloyd's

Lloyd's

As an insurance market, Lloyd’s can provide access to more than 65 expert cyber risk insurers in one place.

itWatch

itWatch

itWatch is focused on data loss prevention (DLP), endpoint security, mobile security, encryption, and cost reducing solutions for IT operations.

International Computer Science Institute (ICSI)

International Computer Science Institute (ICSI)

ICSI is a leading independent, nonprofit center for research in computer science. Research areas include network security and privacy.

Honeynet Project

Honeynet Project

The Honeynet Project is a leading international non-profit security research organization, dedicated to investigating the latest attacks and developing open source security tools.

STM

STM

STM provides system engineering, technical support, project management, technology transfer and logistics support services for the Turkish Armed Forces.

SoSafe

SoSafe

SoSafe empowers organizations to build a security culture and mitigate risk with its GDPR-compliant awareness programs.

Fend

Fend

Fend secures smart infrastructure. We provide a robust, highly secure way to have situational awareness of IoT enabled assets.

Rocheston

Rocheston

Rocheston is an innovation company with cutting-edge research and development in emerging technologies such as Cybersecurity, Internet of Things, Big Data and automation.

Hyperproof

Hyperproof

Hyperproof is a cloud-based compliance operations software. Launch new programs immediately, collect evidence automatically, and manage a compliance program intelligently.

Extreme Engineering Solutions (X-ES)

Extreme Engineering Solutions (X-ES)

Extreme Engineering Solutions is a leader in the design, manufacture, testing, and support of hardware and software solutions for the embedded computing market.

Legit Security

Legit Security

Legit Security's mission is to secure every organization's software factory by protecting the pipelines, infrastructure, code and people for faster and more secure software releases.

Cyderes

Cyderes

Cyderes (Cyber Defense and Response) is a global, pure-play, full life-cycle cyber security services provider formed from the merger of Herjavec Group and Fishtech Group in 2022.

Technoware Solutions

Technoware Solutions

Technoware Solutions is a global company committed to helping entities navigate the digital waters of modernizing their system processes in an ever changing cybersecurity landscape.

ACDS (Advanced Cyber Defence Systems)

ACDS (Advanced Cyber Defence Systems)

ACDS was founded in the belief that cyber security can be done better. We’re combining emerging technologies and proven methods to bring a new approach to tackling the growing threat landscape.

CESAR

CESAR

CESAR is one of the premier R+D and innovation centers in Brazil and a designated Cybersecurity Competence Center.