News

2019-11-01

GDPR Lessons Learned

Uncertainty and contradictions have defined the first year of General Data Protection Regulation (GDPR) enforcement. By Simon Fogg

2019-11-01

Cyber Intelligence & Business Strategy

The planet’s interconnected population will grow from 3.7 to 5 billion over the next 10 years and this has profound consequences for business.

2019-10-31

Facebook, Free Speech & Fake News

Arbiters Of Truth: Twitter's decision to cease political advertising renews pressure on Facebook to control the flow of fake news across its platform.

2019-10-30

Facebook Sues Over Spyware Planted On WhatsApp

Facebook turns aggressive and has filed legal action in California against Israeli NSO Group for allegedly hacking WhatsApp.

2019-10-30

Georgia Suffers A Nationwide Cyber Attack

The national TV station, justice system, thousands of websites including private companies, knocked offline and replaced with a threatening message.

2019-10-30

Google Claims Quantum Supremacy

The race to build the world's first useful quantum computer is nearing its end. Google are claiming victory over IBM. Why is that important?

2019-10-29

NCSC Stopped One Million Criminal Frauds

Britain's national cyber defence centre has thwarted more than one million cases of suspected payment card fraud in the last year.

2019-11-13

WEBINAR: How to Build a Threat Hunting Capability in AWS

November 21 | Do you know how to build an effective threat hunting program in your AWS environment? Learn from SANS and AWS experts.

2019-10-28

The Next Industrial Revolution

A fusion of technologies is blurring the lines between the physical, digital and biological spheres. Its a revolution.

2019-10-28

Cyber Insurance Will Reshape Cyber Security

Insurance firms with the best understanding of cyber security risk will spur businesses to take the actions needed to withstand attacks.

2019-10-28

British Government Funds Chip Maker To Build Cyber Resilience

The UK is partnering with Arm to develop new chip technologies that are more resistant to cyber threats, backed by £36 million in funding.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BCS, The chartered Institute for IT

BCS, The chartered Institute for IT

BCS provides IT professionals with up to date and relevant certifications enabling them to manage IT security effectively within their budget.

Armor

Armor

Armor provide managed cloud security solutions for public, private, hybrid or on-premise cloud environments.

Certification Europe

Certification Europe

Certification Europe is an accredited certification body which provides ISO management system certification including ISO 27001.

Experian

Experian

Experian provide software solutions to help organizations prevent identity fraud and crime.

Genie Networks

Genie Networks

Genie Networks is a leading technology company providing networking and security solutions for optimizing the performance of large networks.

ManTech International

ManTech International

ManTech provides comprehensive, integrated cyber security support, which includes computer and network design, implementation, and operations.

IoT Now

IoT Now

IoT Now explores the evolving opportunities and challenges facing CSPs, and we pass on some lessons learned from those who have taken the first steps in next gen IoT services.

Vaulto Technologies

Vaulto Technologies

Vaulto protects critical business processes that are conducted via the cellular network.

Intel

Intel

Intel products are engineered with built-in security technologies to help protect potential attack surfaces.

CliftonLarsonAllen (CLA)

CliftonLarsonAllen (CLA)

CLA exists to create opportunities for our clients through industry-focused advisory, outsourcing, audit, tax, and consulting services.

Digital Edge

Digital Edge

Digital Edge provides unparalleled Managed Cloud Solutions, as well as superior Information Technology Support Services.

Pillar Technology Partners

Pillar Technology Partners

Pillar Technology Partners is an Information Security Company with a focus on improving Cyber Risk and optimizing the processes and technology that underpin the security of your information assets.

Prime Technology Services

Prime Technology Services

Prime Tech are a group of Red Hat, Microsoft & Cisco Certified IT Professionals with an impressive track record of consistently delivering value to our corporate clients.

ITQ Latam

ITQ Latam

ITQ Latam are specialists in cybersecurity, in a convergent ecosystem of technological solutions in infrastructure, cloud and security networks.

CyberMaxx

CyberMaxx

At CyberMaxx, our approach to cybersecurity provides end-to-end coverage for our customers – we use offense to fuel defense.

Secure Blink

Secure Blink

Secure Blink provides automated application and API security solutions that empower developers and security engineers to protect critical assets from exploitation.