News

2017-01-30

Cyberwar: How Prepared Is Nepal?

Vulnerable: The main reason Nepal has become a target for cyber attackers is the chaos and confusion caused by a big earthquake.

2017-01-30

How Much Cyber Insurance Is Enough?

How a top security manager feels about cyber insurance often may have a lot to do with the type of company he or she works for.

2017-01-25

GCHQ Wants Teenage Girls To Join The Cybersecurity Fight

Teenage girls who spend time online and on social media could become the UK's spies of the future. Or so Britain's intelligence agency hopes.

2017-01-27

Twelve Things To Know About Self Driving Cars

From forecourt to scrapyard, a new car in the UK lasts an average 13.9 years. If you were to buy a new one today, it might be the last you ever buy.

2017-01-27

MI6 Used Information From The Trump Dossier

MI6 used information gathered by ex-agent Christopher Steele in his Trump investigation to warn against Russian cyberattacks.

2017-01-25

Facebook To Introduce Fake News Tools

Facebook is introducing new tools in Germany to help combat the spread of fabricated news stories before the parliamentary elections.

2017-01-25

Give Robots Human Status

The EU parliament wants regulations to govern the use of robots and AI, including a form of “electronic personhood”.

2017-01-25

Anonymous To Trump: You will ‘Regret’ Next 4 Years

Scary? Anonymous, the loose collective of online hackers, has issued an ominous warning to the new President, Donald Trump.

2017-01-27

Populism & Terror Have Killed Geopolitics

Populist politics and extremism promoted on social media are undermining conventional approaches to international relations. Opinion by Taha Ozhan

2017-01-24

Cyber Attack Concerns Ahead Of French Elections

'No political party can say that their systems are seriously secured': France fears foreign interference in the imminent Presidential elections.

2017-01-23

Electoral Influence: 40yrs Of Kremlin Interference

Russian attempts to influence the US presidential election outcome should cause no surprise. It is traditional. Opinion By Prof. Christopher Andrew.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Purdicom

Purdicom

Purdicom (formerly known as Selcoms) is an award winning distributor specialising in Wireless, Cloud & Security technologies.

CyberScout

CyberScout

Cyberscout delivers the latest cybersecurity education, protection and resolutions services. We also provide swift incident response services around the world.

Giesecke+Devrient (G+D)

Giesecke+Devrient (G+D)

Giesecke+Devrient develop security technologies in four major areas: enabling secure payment, providing trusted connectivity, safeguarding identities and protecting digital infrastructures.

Bavarian IT Security Cluster

Bavarian IT Security Cluster

The Bavarian IT Security Cluster works to build regional IT security competencies and increase the competitiveness and market opportunities of its member companies.

InstaSafe Technologies

InstaSafe Technologies

InstaSafe®, a Software Defined Perimeter based (SDP) one-stop Secure Access Solution for On-Premise and Cloud Applications.

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field.

Orca Security

Orca Security

Orca Security delivers full stack visibility including prioritized alerts to vulnerabilities, compromises, misconfigurations, and more across your entire inventory on all your cloud accounts.

Variti

Variti

Variti Intelligent Active Bot Protection technology — traffic analysis, detection and stopping of malicious bots in real-time and effective response to DDoS attacks.

Schweitzer Engineering Laboratories (SEL)

Schweitzer Engineering Laboratories (SEL)

SEL specializes in creating digital products and systems that protect, control, and automate power systems around the world.

Guardian Digital

Guardian Digital

Guardian Digital makes email safe for business. Threat-ready business email protection. Fully supported.

FoxTech

FoxTech

FoxTech is an independent, friendly and deeply specialised cyber security company in the UK, with expertise spanning decades of Public Sector and Government services.

ViewQwest

ViewQwest

ViewQwest is a regional telecommunications & information technology services company. We specialize in providing Connectivity, Managed Network, Managed SD-WAN, and Managed Security solutions.

AI Spera

AI Spera

AI-Driven Cyber Threat Intelligence Security. AI Spera provides real-time intelligence to empower your security competences in all aspects of the business.

Board of Cyber

Board of Cyber

Board of Cyber offers Security Rating: a fast, non-intrusive, continuous, 100% automated solution to evaluate the cyber performance of an organization.

EkoCyber

EkoCyber

EkoCyber partner with businesses as a value-added MSSP to provide top-tier, trusted and transparent cyber security services at an affordable price point.

Acumen

Acumen

Acumen's cyber security engineers protect your critical systems, in critical moments. We are here when you need us most.