News

2016-07-29

AI Defeats Human Fighter Pilots

The new AI, called ALPHA runs on cheap desktop PC and can outperform and beat human pilots in combat simulations.

2016-07-29

What To Look For In A Security Consultant

Running a secure business means achieving organisational priorities in a fast-evolving landscape. This requires anticipation & adaptability.

2016-07-23

UK Parish Councils Can Get Website Construction Funding

UK Parish Councils have an electronic opportunity to connect their local community by using the Internet and government to pay for their website.

2016-07-28

ISIS Warn That London 'next to be attacked'

Open Source Intelligence: London is on the next list of target cities for a jihadi outrage attack

2016-07-28

Mining Bitcoin Just Halved

Bitcoin just experienced a major milestone in its short little life-span.

2016-07-28

Major Privacy Win For Microsoft in 'free for all' Data

The US government cannot force Microsoft to give authorities access to the firm's servers located in other countries, a court has ruled.

2016-07-28

Next Steps For Data Protection: Implementation, Compliance & Best Practice

This CPD certified event will provide a timely opportunity for delegates to discuss the implications of EU Data Protection regulatory changes.

2016-07-28

Taiwan Police Catch ATM Gang For $2.5m Bank Theft

They are accused of targeting First Bank’s ATMs last week, using malware to withdraw more than T$80 million ($2.5 million) from dozens of machines.

2016-07-27

Cybersecurity Should Create Business Growth Strategies (£)

Boards, IT Management and CEOs are under pressure from from commercial and government regulators to monitor and secure their company’s cyber security.

2016-07-27

UK Parliamentary Committee Wish To Penalise CEOs for Cyber Breaches (£)

Committee recommends heavier penalties for cyber criminals. They also say that it is important to have penalties for CEOs of breached companies.

2016-07-27

Data Science’s Commercial Opportunities (£)

Data Science has the real potential of creating more business for your organisation if it is used well and your requirements are really understood.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Splunk

Splunk

Splunk provide real-time Security Information & Event Management solutions for Enterprise Networks, Cloud and small-scale IT environments

Barracuda Networks

Barracuda Networks

Barracuda provides a range of solutions covering network security, data storage, protection and disaster recovery.

Fortinet

Fortinet

Fortinet is a provider of network security systems. Our products provide protection against dynamic security threats while simplifying the IT security infrastructure.

PhishLabs

PhishLabs

PhishLabs provides 24/7 services that help organizations protect against the cyberattacks targeting their employees, their customers and their brands.

Sopra Steria

Sopra Steria

Sopra Steria is a leading European information technology consultancy.

Insta Group

Insta Group

Insta are a trusted cyber security partner for security-critical companies and organizations.

Akheros

Akheros

Akheros develops cybersecurity learning algorithms which anticipate, detect and prevent offensive and incongruous behaviors of M2M interactions.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Kasm Technologies

Kasm Technologies

Kasm Browser Isolation - Protect your organization from malware, ransomware and phishing by using zero-trust containerized browsers.

North American International Cyber Summit

North American International Cyber Summit

The North American International Cyber Summit brings together experts from around the globe to provide timely content and address a variety of cybersecurity issues impacting the world.

ValueMentor

ValueMentor

ValueMentor is a leading cyber security service provider in the Middle East. We enable clients to reduce risk by taking a strategic approach to cybersecurity.

RocketCyber

RocketCyber

RocketCyber is a Managed SOC platform empowering Managed Service Providers (MSPs) to deliver security services to small and medium businesses.

Start Left™ Security

Start Left™ Security

Start Left™ Security's Tauruseer Platform is the patented data-driven security posture management solution that provides a complete life cycle approach for proactive security in one place. 

Axiata Digital Labs

Axiata Digital Labs

Axiata Digital Labs is the technology hub of Axiata Group Berhad Malaysia which is one of the leading groups in telecommunication in Asia.

Project Cypher

Project Cypher

Project Cypher leverages the latest cybersecurity developments, a world class team of hackers and constant R&D to provide you with unparalleled cybersecurity offerings.

Bearer

Bearer

Bearer helps modern teams ship trustworthy products with the help of our code security solution built for security, privacy and engineering teams.