News

2016-11-01

CyberXchange Conference 2016

West Africa’s premier information security conference is held at the Landmark Event Centre, Lekki Lagos Nigeria, from November 2nd & 3rd

2016-11-16

Internet of Things: 2017 Predictions

Experts are beginning to recognise that the IoT's potential to fuel business growth is accompanied by multifaceted complexity.

2016-11-16

Cant Be Bothered: Non-Security Policy Used By 90% Of Workers

Most workers put convenience ahead of security policies, with 90% of them admitting to ignoring them when they feel they need to.

2016-11-14

Cyber Attack Takes Liberia’s Entire Internet Down

A cyber-attack knocked Liberia’s Internet offline, as hackers targeted the nation’s infrastructure using a mass DDOS technique.

2016-11-15

Jason Bourne: Envisioning A ‘frightening’ Cyberwar

Fact Or Fiction: Bourne's author “extrapolating” from his new thriller a “frightening” scenario of cyberwarfare that could inflict the real world.

2016-11-14

Company Directors Should Have Personal Liability For Data Breaches

The UK's Information Commissioner recommends government should hold company directors personally accountable for for data breaches.

2016-11-18

Self-drive Vehicles – A New Reality

There’s a powerful force behind the development of autonomous-vehicle technology. Armies around the world.

2016-11-18

Inside Anonymous - ‘Civil War’ Over Its Fight With ISIS

Hacktivist collective Anonymous cannot agree on strategy or tactics in it's self-appointed task of tackling IS Cyber Jihad.

2016-11-19

Nude Celebrity Photo Hacker Jailed

“Celebgate” perpetrator who hacked the Apple iCloud would have been foiled by two-step authentication.

2016-11-10

Cybercrime in Canada

Cybercrime is top of mind for many Canadian small and medium-sized businesses (SMBs).

2016-11-18

Bitcoin Just Isn’t Anonymous Enough

The anonymity of bitcoin has gained it many criminal users. Now, though, it's looking like the digital currency isn’t quite anonymous enough.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cortado Mobile Solutions

Cortado Mobile Solutions

Cortado Mobile Solutions is the manufacturer of the mobile device management solution Cortado MDM.

KnowBe4

KnowBe4

KnowBe4 is an integrated platform for security awareness training combined with simulated phishing attacks.

ObserveIT

ObserveIT

ObserveIT helps companies identify & eliminate insider threats. Visually monitor & quickly investigate with our easy-deploy user activity monitoring solution.

Cyber Senate

Cyber Senate

Cyber Senate is dedicated to bringing Operators of Essential Services together with global subject matter experts to address the challenges of evolving cyber threats to critical infrastructure.

OneWelcome

OneWelcome

Onegini and iWelcome have merged to become OneWelcome, the largest European Identity Access Management Saas Vendor.

MER Group

MER Group

MER Group is a world-leading integrator in the areas of communications and security. MER cyber solutions cover the entire range of cyber and intelligence related products and services.

Belkasoft

Belkasoft

Belkasoft is a software vendor providing public agencies, corporate security teams, and private investigators with digital forensic solutions.

ACM-CCAS

ACM-CCAS

ACM is a UKAS-accredited certification body helping businesses around the world perform to a higher standard. Our certifications include ISO 27001 and ISO 22301.

SecZetta

SecZetta

SecZetta provides third-party identity risk solutions that are easy to use, and purpose built to help organizations execute risk-based identity access and lifecycle strategies.

Tetrad Digital Integrity (TDI)

Tetrad Digital Integrity (TDI)

TDI is a world-class consulting firm offering cybersecurity services to government agencies and commercial clients around the world.

Airnow Cybersecurity

Airnow Cybersecurity

Airnow Cybersecurity provide digital cybersecurity services and solutions for organizations and app publishers.

Netizen

Netizen

Netizen is an award-winning company that develops and leverages innovative solutions to enable a more secure cyberspace for clients in government and commercial markets.

CIBR Warriors

CIBR Warriors

CIBR Warriors are a leading cyber security and networking staffing company that provides workforce solutions with businesses nationwide in the USA.

4Securitas

4Securitas

4Securitas is an innovative cyber security firm focused on protecting critical data at the core of every organisation.

Varen Technologies

Varen Technologies

Varen Technologies is an innovative consulting partner with highly respected cyber security, analytics, Agile Software Development and IT/maintenance expertise.

Atlant Security

Atlant Security

Atlant Security is a cyber and IT security company offering consulting and implementation services.