FREE TO VIEW


« Back to News

2017-08-01

WannaCry Drives Cyber Insurance

One effect of WannaCry compared to other high profile attacks is an unprecedented jump and a sustained interest in corporate cyber insurance.

2017-07-31

Hunters Take Down Terrorists On The Internet

Freelancers are hunting down terrorist content across social media platforms and messaging apps, doing a job the tech companies don't.

2017-07-28

British Innovation Lags Behind France & Germany’s

Britain is lagging behind European rivals on innovation, with both France and Germany filing significantly more patents than the UK.

2017-07-31

Data Threat: Your Ex-Employees

Despite increasing cybersecurity awareness many businesses are not doing enough to guard against security threats brought on by ex-employees.

2017-07-31

IoT Is Becoming A Nightmare For IT

The Internet of Things, at its simplest level, is about connecting smart devices but it is far from a simple challenge for IT departments.

2017-07-31

Cybercrime Is A Boardroom Issue

The threat of cybercrime has outgrown the scope of IT departments and senior managers need to start taking cybersecurity seriously.

2017-07-28

Cybersecurity Habits Across The Generations

Boomers, Generation X, Millennials, Generation Z. It turns out the younger you are, the less you care about online security.

2017-07-28

UK National Cyber Security Centre Has Not Certified Kaspersky

Revealed: Britain's National Cyber Security Centre has never certified products from Russian cybersecurity firm Kaspersky Lab.

2017-07-28

Cybersecurity Is More Difficult Than 2 Years Ago

Over 70 percent of cybersecurity and IT professionals believe cybersecurity analytics and operations are more difficult now. What are the reasons?

2017-07-27

Three Most In-Demand Cybersecurity Jobs

Cybersecurity jobs rank among the most difficult to fill in any enterprise, with the talent gap expected to reach 1.8 million jobs by 2022. It's a candidates market.

2017-07-27

Trump Tells US Cyber Command To Get More Aggressive

The Trump administration is pushing forward with its plan to make US Cyber Command increase the nation’s offensive and defensive cyber capabilities.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

SANS Institute

SANS Institute

SANS is the most trusted and by far the largest source for information security training and security certification in the world.

National Association of Software and Services Companies (NASSCOM)

National Association of Software and Services Companies (NASSCOM)

NASSCOM is a trade association of Indian Information Technology and Business Process Outsourcing industry. Areas of activity include cyber security.

Professional Insurance Agents (PIA)

Professional Insurance Agents (PIA)

Professional Insurance Agents (PIA) offer commercial insurance services including Cyber Liability insurance.

Cyber London (CyLon)

Cyber London (CyLon)

CyLon is a leading cyber security accelerator and seed investment programme. We help entrepreneurs from across the globe to build cyber security businesses, raise investment, and develop partnerships.

Rizikon Assurance

Rizikon Assurance

Rizikon Assurance is an Online System that improves Third-Party Assurance and Risk Management, through efficiency, automation and better visibility.

Cira Info Tech

Cira Info Tech

Cira InfoTech’s cyber security and network consulting and managed services deliver unmatched talented resources and capabilities required to design and build an agile and adaptive IT environment.

NightDragon

NightDragon

NightDragon is a venture capital firm investing in innovative growth and late stage companies within the cybersecurity, safety, security, and privacy industry.

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center of Vietnam has a central monitoring function and is a technical focal point for monitoring and supporting information security for people, businesses and systems.

Auvik Networks

Auvik Networks

Auvik is easy-to-use cloud-based networking management and monitoring software - true network visibility and control without the hassle.

Suridata

Suridata

Suridata’s SaaS Security platform enables organizations to secure the use of SaaS applications.

IGI Cybersecurity

IGI Cybersecurity

IGI Cybersecurity delivers people-driven cybersecurity for personalized, resilient cyber defense focused on individualized strategy and unshakeable partnership.

Cranium

Cranium

Cranium are an international consultancy organisation specialised in privacy, security and data management.

RiverSafe

RiverSafe

RiverSafe is a professional services provider specialising in Cyber Security, Data Operations and DevOps, putting security at the heart of everything we do.

SecZone

SecZone

SecZone is a Chinese enterprise with a mission to "Make It Secure." We are dedicated to driving software security innovation globally.

Inveo Group

Inveo Group

Inveo group is the Italian leader for the management of privacy and data protection issues.

Neo Auth

Neo Auth

Neo Auth is an identity and access management solution to help organizations optimize their cybersecurity processes.