News

2015-05-26

Pentagon Might Share US Data with Foreign Militaries

Proposed US Cyber Information Sharing Act will permit sharing cyber threat data beyond the United States.

2015-05-26

Top Security Tools to Fight Against Cybercrime

Cybercrime is a massive global threat and US businesses are the No.1 target.Top security professionals name their most valuable security tool.

2015-05-26

US Defense Signals Silicon Valley's Cyberwar Help

The US government has a rapidly growing dependence on Silicon Valley,

2015-05-26

EU’s 'point of no return' if Internet Firms Not Regulated

Amazon, Etsy and Booking.com are all named in a leaked document as having 'undue power' over their markets.

2015-05-26

Machine Learning for Cybersecurity

Traditional security systems are passive and a small code change by attackers can lead to even the most secure networks being breached.

2015-05-26

Redefining Your Data Protection Strategy

IT infrastructure needs to evolve, particularly for data protection. (Report)

2015-05-26

US Cyber Security Insurance Developments

US insurance regulators have increased their scrutiny of cyber security measures taken by insurance companies.

2015-05-24

Silicon Valley a Major Player in Cyberwarfare

US Department of Defense will provide venture capital funding to startups that can help the Pentagon develop more advanced cybersecurity.

2015-05-27

Cyber Crime on a Global Scale

Cyber crime is ubiquitous, from intercepting your car's bluetooth, to using apps & the Internet to steal private details of millions of citizens.

2015-05-22

FBI Director says ISIS Could Cyberattack the US

ISIS is “waking up” to the idea of using sophisticated malware to cyberattack critical infrastructure in the US.

2015-05-22

UK Rewrites Hacking Laws to Give GCHQ Immunity

Changes to the Computer Misuse Act were secretly introduced over a year ago.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Crest International

Crest International

Crest is focused on professionalizing the technical cyber security market whilst driving quality and standards of organizations that operate within it.

Black Kite

Black Kite

Black Kite (formerly NormShield) provides comprehensive Security-as-a-Service solutions focused on cyber threat intelligence, vulnerability management and continuous perimeter monitoring.

Blancco Technology Group

Blancco Technology Group

Blancco Technology Group is a leading global provider of mobile device diagnostics and secure data erasure solutions.

Zuratrust

Zuratrust

Zuratrust provide protection for all kinds of email related cyber attacks.

Alpine Cyber Solutions

Alpine Cyber Solutions

Alpine Cyber is a Managed IT Service Provider focused on cybersecurity and cloud services.

TrustMAPP

TrustMAPP

TrustMAPP automates cybersecurity & privacy assessments, with universal workflow, allowing teams to generate analytics and recommendations to align priorities for improvement.

Nucleus Security

Nucleus Security

Nucleus is a leading Vulnerability Management platform for Large Enterprises, MSPs/MSSPs, and Application Security Teams that want more from their vulnerability management tools.

Edureka

Edureka

Edureka is an online technology training provider with the most effective learning system in the world. We help professionals learn trending technologies for career growth.

CWSI

CWSI

CWSI provide a full suite of enterprise mobility, security and productivity solutions to many of Ireland and the UK’s most respected organisations across a wide range of industry and public sectors.

SIXGEN

SIXGEN

SIXGEN provides incident response, operational and penetration testing, red teaming, tool development, cyber training development and continuous monitoring.

HarfangLab

HarfangLab

HarfangLab develops a hunting software to boost detection and neutralization of cyberattacks against companies endpoints.

BAE Systems

BAE Systems

BAE Systems develop, engineer, manufacture, and support products and systems to deliver military capability, protect national security, and keep critical information and infrastructure secure.

Pangu Laboratory

Pangu Laboratory

Beijing Qi an Pangu Laboratory Technology Co., Ltd. was established on the basis of Pangu laboratory, a well-known cyber security team.

NetScout Systems

NetScout Systems

NetScout assures digital business services against disruptions in availability, performance, and security.

LT Harper

LT Harper

LT Harper specialise in cyber security recruitment. We believe in providing an individualised service to our customers whether they are looking for a new opportunity or to hire talent.

MIND

MIND

MIND is the first-ever data security platform that puts data loss prevention and insider risk management programs on autopilot, so you can automatically identify, detect and prevent data leaks.