FREE TO VIEW


« Back to News

2016-04-15

Three Reasons To Revise Your Cyber Security Plans

A cybersecurity strategy that is not up to date with current security tools & research leaves your organizations open to attack.

2016-04-13

People Are (Still) The Biggest Security Risks

Curiosity: It's better to think before you click.

2016-04-15

SMEs Underestimate The PR Damage Caused By A Cyber Breach

SMEs dangerously underestimate the impact of cyber attacks on their reputation, but can protect themselves.

2016-04-15

EU Cyber Agency Urges Action To Avoid Crisis

EU countries lack a harmonised framework to respond to the challenges of a large-scale cyber incident, according to security agency Enisa.

2016-04-18

Boardroom: Elevating Cybersecurity Discussions

As data breaches continue to rise, organizations, regardless of their size or industry they are in, must adopt a new mindset.

2016-04-13

Who’s in Charge When US Suffers A Cyberattack?

Is it NORTHCOM or CYBERCOM? CYBERCOM or the NSA—or both?

2016-04-18

FBI Says A Mysterious Hacking Group Has Had Access To US Government Networks For Years

Hacking group APT6 “have compromised and stolen sensitive information from various government & commercial networks” since 2011.

2016-04-14

Women in Cybersecurity

Women in Cybersecurity (WiCyS) has just held its third annual Women in Cybersecurity Event.

2016-04-18

Were Brussels Terrorists Trying To Build 'dirty bomb'

The ISIS terrorists who blew up Brussels airport and attacked the metro were secretly videotaping a Belgian nuclear official.

2016-04-15

Donald Trump Has A Plan for CyberWar

Donald Trump has elaborated some bold and belligerent foreign-policy prescriptions.

2016-04-12

UK Investigatory Powers Bill Will Cost £1bn To Implement

The UK Home Office has been told its plans to retain web-browsing history of all British citizens for 12 months would cost in excess of £1bn.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Datto

Datto

Datto delivers a single toolbox of easy to use products and services designed specifically for managed service providers and the businesses they serve.

Detack

Detack

Detack is an independent supplier of IT security auditing and consulting services.

techUK

techUK

techUK represents companies operating in the tech sector in the UK. Focus areas cover all aspects of ICT including cyber security.

Futurex

Futurex

Futurex is a globally recognized provider of enterprise-class data encryption solutions.

Omada

Omada

Omada is a leading provider of IT security solutions and services for identity management and access governance.

AUTOCRYPT

AUTOCRYPT

AUTOCRYPT is a mobility security provider dedicated to the safety of future transportation

AuthLite

AuthLite

With AuthLite, you can keep using all your existing software, with added two-factor authentication security placed exactly where you need it.

WolfSSL

WolfSSL

wolfSSL is an embedded SSL/TLS library providing secure communication for IoT, smart grid, connected home, routers, applications, games, phones, and more.

Tego Cyber

Tego Cyber

Tego Cyber delivers a state-of-the-art threat intelligence platform that helps enterprises deploy the proper resolution to an identified threat before the enterprise is compromised.

Capital Network Solutions

Capital Network Solutions

Capital Network Solutions are a highly accredited managed IT services and consultancy provider, specialising in cyber security, infrastructure and communications.

Great American Insurance Group

Great American Insurance Group

Great American's Cyber Risk Division offers cyber solutions for small and medium-sized businesses.

Ghost Security

Ghost Security

Ghost is a venture backed, product-led startup building the new standard in application security for the modern enterprise.

ASMGi

ASMGi

ASMGi is a managed services, security and GRC solutions, and software development provider.

Positiwise Software Pvt Ltd

Positiwise Software Pvt Ltd

Positiwise Software offers end-to-end software development solutions to accelerate the digital growth of businesses.

RIoT Secure

RIoT Secure

RIoT Secure AB is a technology enabler within the IoT industry - created with a vision to ensure security technology exists in the foundations of software development for IoT solutions.

ETI-NET

ETI-NET

ETI-NET is the worldwide leader in managing critical data for industries that never stop.