News

2016-11-21

NSA Chief Has A Special Phone For Top-Secret Messaging

There’s no such thing as a perfectly secure phone, especially if it also connects to the Internet.

2016-11-16

Could You Be A UK Cyber-Warrior?

A crack team of 50 'brilliant brains' is to be recruited by the UK Government to defend the country against hacking attacks.

2016-11-21

Overconfident: US Will Win A Cyber War With China

The Rand Corporation think that the US will soon have a clear advantage over China in cyber war scenarios set in the S.China sea.

2016-11-16

How Businesses Can Prevent Point-of-Sale Attacks

Retailers are victimized through the same Achilles' heel: the point-of-sale system, where customers' payment data is routinely processed.

2016-11-21

Cisco says It Will Make The IoT Safe

Cisco Systems is making a play for the fundamental process of putting IoT devices online, promising businesses greater security.

2016-11-19

Securing Data in the Cloud

Storing data in the cloud is a standard practice for today’s connected business. That does not mean they can afford to be complacent about security.

2016-11-18

Cyber-attacks & Hacking: What You Need To Know

Is the UK Government's investment of £1.9 Billion in cybersecurity defence plus a retaliatory capability really enough to address all the threats?

2016-11-15

UK Will Retaliate Against Cyberattacks

Preparing To Retaliate: Hostile "foreign actors" are developing techniques that threaten the UK's electrical grid and airports.

2016-11-10

Pepper Keep’s Son Robot Dreams on Hold

Japan's obsession with robots isn't just a cliché. Companies have been trying to drum up enthusiasm for them for years, with little success.

2016-11-11

A Career In Cyber Security Governance?

Cyber security governance jobs are growing faster than IT and there just aren't enough skilled professionals to fill the available jobs.

2016-11-11

The US Cyber Threat Against Russia

Off The Record: The US has penetrated Russia’s electric grid, telecommunications networks and the Kremlin’s command systems.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Orange Cyberdefense

Orange Cyberdefense

Orange Cyberdefense is the expert cybersecurity business unit of the Orange Group, providing managed security, managed threat detection & response services to organizations around the globe.

Oak Ridge National Laboratory (ORNL)

Oak Ridge National Laboratory (ORNL)

ORNL conducts basic and applied research and development in key areas of science for energy, advanced materials, supercomputing and national security including cybersecurity.

Awake Security

Awake Security

Awake Security offer a security solution built on an AI platform that acts like the human brain to sense, detect, and respond to threats you may not even know exist.

Applied Science and Technology Research Institute Company Limited (ASTRI)

Applied Science and Technology Research Institute Company Limited (ASTRI)

ASTRI's mission is to enhance Hong Kong’s competitiveness in technology-based industries through applied research in areas including Security & Data Sciences which encompasses cybersecurity.

Telecommunications & Digital Government Regulatory Authority (TDRA) - UAE

Telecommunications & Digital Government Regulatory Authority (TDRA) - UAE

TDRA focuses on regulating the telecommunications sector and enabling government entities in the field of smart transformation. It is responsible for the overall digital infrastructure in the UAE.

ChainSecurity

ChainSecurity

ChainSecurity provides products and services for securing smart contracts and blockchain protocols and conducts R&D in the areas of security, program analysis, and machine learning.

Exire Technologies

Exire Technologies

Exire Technologies is comprised of a team of professionals who are specialised in cybersecurity and a value added reseller and integrator of ICT security systems.

Citalid

Citalid

The Citalid cyber risk management platform combines threat and business intelligence to identify the risks scenarios you face.

Acceptto

Acceptto

Acceptto offers the first unified and continuous authentication identity access platform with No-Password.

Snowflake

Snowflake

Empower your cybersecurity and compliance teams with Snowflake. Gain full visibility into security logs, at massive scale, while reducing costs of Security Information and Event Management systems.

IDX

IDX

IDX is the leading consumer privacy platform built for agility in the digital age.

Rostelecom Solar

Rostelecom Solar

Rostelecom-Solar is a Cyber Security Company, providing software and managed detection and response (MDR) services to protect critical information from advanced cyber threats.

SafePaas

SafePaas

SafePaas is a leading Enterprise Risk Management Platform. One source of truth for all your Audit, Risk, and Compliance requirements. Complete governance across your systems.

Concorde Technology Group

Concorde Technology Group

Concorde Technology Group is one of the UK’s leading IT support and services providers, delivering cost-effective and innovative IT solutions to businesses across the country.

Gomboc.ai

Gomboc.ai

Gomboc solve cloud infrastructure security policy deviations by providing tailored remediations to the IaC (Infrastructure as Code).

Somos

Somos

From voice to messaging to fraud prevention and beyond, Somos are committed to developing innovative solutions that ensure that our ability to maintain trustworthy connections never stops.