For continued FREE access to Articles and Directory Listings please LOGIN to your Account or SIGN UP.
2022-09-07

CIO & CISO Visions Leadership Summit - 9th to 11th October

Leadership Summit: Dedicated to IT and information security leaders; delivering the exact content, insight, connections & rewards you need.

2022-09-30

Ukraine Predicts A Massive Cyber Attack From Russia

After seven months of conflict and as winter approaches, Russia will target the energy sector to hurt Ukrainian civilians & threaten their security.

2022-09-30

Why Companies Need a Next-Gen Approach To Business Continuity

IT teams must reevaluate their approach to business continuity to withstand the threats coming at them fast and furious. By Florian Malecki

2022-09-29

How To Outsmart Increasingly Complex Cyber Attacks

Outsourcing elements of security can help organisations reach better security outcomes previously exclusive to large enterprises. By Leyton Jefferies

2022-09-28

British Girl’s Suicide Puts Spotlight On Social Media

Anxiety, Depression, Self-harm & Suicide: The death of a 14-year-old girl may prove a turning point in the regulation of social media in Britain.

2022-09-28

Denmark Wins 2022 European Cyber Security Challenge

Defend & Attack Under Pressure: ENISA's annual EU cyber security challenge competition set rival national teams against each other.

2022-09-28

Pivoting Customers' Mindsets For Cloud Security

When businesses increase cloud capability and cloud velocity, they often create new risk areas outside their familiarity. By JD Sherry

2022-09-27

Securing The Future Of Open Finance

Financial-Grade Security: The adoption of Open Banking raises critical cyber security concerns over outdated systems. By Jacob Ideskog

2022-09-27

Many Cyber Security Experts Don’t Understand The Systems They Are Trying To Secure

Square Peg In A Round Hole: The operating technology behind Industrial Control Systems & devices is a mystery to IT professionals. By Joe Weiss 

2022-09-23

Quantum Computing Raises As Many Problems As It Solves

Quantum computing poses both opportunities and risks to the cyber security environment and above all, a serious threat to encrypted communications.

2022-09-22

Even Air-Gapped Computers Are Vulnerable To Attack

LaserShark: Computer systems that are physically isolated from the outside world (air-gapped) can still be attacked via optical channels.

2022-09-22

Artificial Intelligence Distorts Government Decision-Making

AI reinforces the divisions of democracy and might also confound autocratic regimes, by concealing underlying social splits with false consensus.

Subscribe!

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Aurec

Aurec

Aurec provides specialist recruitment and contracting services including ICT professionals.

SANS Institute

SANS Institute

SANS is the most trusted and by far the largest source for information security training and security certification in the world.

Cristie Data

Cristie Data

Cristie have been a trusted, innovative and leading edge data storage, backup and virtualisation solutions provider across all sectors of industry for over 40 years.

Secure Source

Secure Source

Secure Source specialise in search and recruitment for Cyber Security and Security Cleared markets.

Texplained

Texplained

Texplained specializes in security audits of microchips to identify vulnerabilities and protect against invasive cyber attacks.

Bedrock Automation

Bedrock Automation

Bedrock Automation provides the world’s most powerful, scalable and cyber secure industrial control system (ICS).

CUIng.org

CUIng.org

The CUIng initiative was launched to tackle the problem of criminal exploitation of information hiding techniques.

Dispersive Networks

Dispersive Networks

Dispersive Virtual Network is a carrier-grade software-defined programmable network that is inspired by battlefield-proven wireless radio techniques.

Security University

Security University

Security University is a leading provider of Qualified Hands-On Cybersecurity Education, Information Assurance Training and Certifications for IT and Security Professionals.

IBA Security

IBA Security

IBA Security is a center of competence consolidating the cybersecurity expertise of the IBA Group.

Salviol Global Analytics

Salviol Global Analytics

Salviol Global Analytics is a leading provider of Fraud, Risk and Operational Performance Solutions to a number of vertical markets including Insurance, Banking, Utilities, Telco’s and Government.

Blockchain Security Solutions (BCSS)

Blockchain Security Solutions (BCSS)

Blockchain Security Solutions delivers solutions to make Blockchains more cyber secure. It provides services to authorities and institutes to make the Blockchain unattractive for cybercriminals.

Avertium

Avertium

Avertium is the managed security and consulting provider that companies turn to when they want more than check-the-box cybersecurity.

UK Cyber Security Association (UKCSA)

UK Cyber Security Association (UKCSA)

The UK Cyber Security Association (UKCSA) is a membership organisation for individuals and organisations who actively work in the cyber security industry.

COSEINC

COSEINC

COSEINC is a Singapore based and privately funded company dedicated to providing highly specialized information security services to our clients.

Factmata

Factmata

Factmata is an social and news media monitoring and analytics product that uses AI to identify and track narratives online, highlighting those most likely to cause brand harm or misinform the public.