News

2019-05-24

GCHQ Certified Training

There has never been a better time to invest in cyber security training and the GCHQ Certified Training (GCT) scheme provides a benchmark.

2019-05-24

Five Things to Know About 5G

The new networking standard is not just about faster smartphones. Higher speeds and lower latency will enable entirely new experiences.

2019-05-23

GDPR Is One Year Old This Week

Over 59,000 data breach notifications have been reported across the European Economic Area and The Netherlands, Germany and UK top the list.

2019-05-20

Google Blocks Huawei From Android

Google has barred Huawei from critical updates to the Android OS whilst chipmakers contemplate cancelling smartphone component supplies.

2019-05-17

Iranian Cyber-Espionage Exposed

Revealed: An Iranian hacking team's lists of its victims, attack strategies, alleged areas of access & employee lists relevant to espionage systems.

2019-06-06

Cyber Breaches Will Kill

Cars, appliances, power plants & medical devices are all at risk from hacking. In a world of "smart" devices that means the Internet can kill people.

2019-06-06

The Worldwide Skills Shortage Is Growing

The shortage of cyber security professionals puts organisations at risk and this is the No. 1 concern among those who already work in the field.

2019-06-06

Blockchain Can Improve Cyber Security

Blockchain tech offers one of the most effective tools to protect data from fraud and theft. It does this by complicating the work of hackers.

2019-05-22

Huawei Offers A 'No-Spy' Agreement

Bending to multinational pressure, Huawei's chairman say he's "willing to sign no-spy agreements with governments", including the UK.

2019-05-22

Five Tech Giants Promise To Stop Terrorist Content

Facebook, Amazon, Google, Twitter and Microsoft agree to develop shared tools to detect and remove terrorist or extremist content.

2019-06-06

Big-Data Analytics Risks Becoming Jammed

Big data Analytics are becoming core for almost any activity in the business, government, and security sectors.But is there just too much data?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Blue Solutions

Blue Solutions

Blue Solutions is a consultancy-led, accredited software distributor who provides IT solutions and support to small and medium enterprises.

Secure Identity Alliance (SIA)

Secure Identity Alliance (SIA)

The Secure Identity Alliance is dedicated to supporting sustainable worldwide economic growth and prosperity through the development of trusted digital identities and the adoption of secure eServices.

DeviceLock

DeviceLock

DeviceLock is a leading provider of endpoint device/port control and data leak prevention software.

MetaFlows

MetaFlows

MetaFlows’ SaaS malware detection & prevention software passively analyzes the behavior and the content of Internet traffic.

Alan Turing Institute

Alan Turing Institute

Alan Turing Institute is the UK national institute for data science. A major focus is Big Data analysis with applications including cyber security.

OnSystem Logic

OnSystem Logic

OnSystem Logic has developed a unique, patent-pending solution to solve the problem of the exploitation of flaws in application software as a technique for cyber attacks.

Cyacomb

Cyacomb

Cyacomb (formerly Cyan Forensics) provides digital forensics software to help police forces find evidence on computers many times faster than before.

360 Total Security

360 Total Security

360 company is the largest provider of Internet and mobile security products in China.

XLAB

XLAB

XLAB is an R&D company with a strong research background in the fields of distributed systems, cloud computing, security and dependability of systems.

Blueskytec (BST)

Blueskytec (BST)

BST provide accredited, patent-pending commercial cyber security hardware and software to protect your cyber physical systems from attack.

BAI Security

BAI Security

BAI Security is a Nationally Recognized Leader in IT Security. Keeping your data safe and your business compliant is our singular focus.

Responsive Technology Partners

Responsive Technology Partners

Responsive Technology Partners provides superior IT support services including cybersecurity and compliance, telephony, cloud services, cabling, access control, and camera systems.

Resilience Cyber insurance

Resilience Cyber insurance

Resilience helps to improve cyber resilience by connecting cyber insurance coverage with advanced cybersecurity visibility and a shared plan to reinforce great cyber hygiene.

Darknone Global

Darknone Global

Darknone is a consortium of elite hackers and security leaders united by an unbridled passion for augmenting the security of the digital realm.

Tychon

Tychon

Tychon develops advanced enterprise endpoint management technology that enables commercial and government organizations to bridge the gap between security and IT operations.

Dispel

Dispel

Dispel makes the fastest secure remote access for industrial networks. Built by operators for operators: a zero trust engine for your entire OT, IoT, and xIoT stack.