News

2016-05-20

Related Aspects Of A Breach: Impact Of Partners & Suppliers

Analysis of the giant breach at retailer Target shows that business partners and suppliers can spell big trouble for an organization’s security.

2016-05-20

Vulnerable Australia Boosts National Cyber Security

Australia introduces a multi-million-dollar national cybersecurity policy to combat hacking but stops short of blaming recent attacks on China.

2016-05-23

Healthcare Execs Credit IT With Improving Care

Healthcare managers say the cost savings and interoprability benefits of improved IT systems outweigh the security concerns.

2016-05-23

Unified Cyber Command To Help US React Faster

Defense leaders are contemplating elevating US CyberCom to a full-fledged unified command.

2016-05-20

Enhanced Attribution Program To Identify & Track Hackers Worldwide

Pentagon researchers want to consistently identify virtual personas and individual malicious cyber operators across different endpoint devices.

2016-05-18

'Guccifer' Claims He Got Inside Hillary Clinton's Server

Romanian hacker claims to have gained access to the former US Secretary of State's Clinton's "completely unsecured" server.

2016-05-16

Bank Launches Big Data Insight Product For SMEs

A new online service to provide insights and deeper analysis of customer transactions and highlight behaviour and spending patterns.

2016-05-13

Swiss Defense Ministry Targeted

Russian hackers suspected of industrial espionage.

2016-05-13

Can FinTech Supersede Financial Services Workers?

The world of finance is being transformed by emerging technologies, and that will mean lots of lost jobs.

2016-05-13

Tech Jobs Would Be Great, If It Wasn’t For The Users

IT jobs would be so much better if they didn’t have to deal with other people.

2016-05-13

Exposing Cybercrime As A Business Model

Trustwave reveal how sophisticated criminal organizations are most likely to attack, and more importantly, how potential victims can defend their assets

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LogicManager

LogicManager

LogicManager offer a complete set of IT governance, risk and compliance software solutions and advisory services.

aeCERT

aeCERT

aeCERT is the national Computer Emergency Response Team for the United Arab Emirates.

Auth0

Auth0

Auth0 is a cloud service that provides a set of unified APIs and tools that instantly enables single sign-on and user management for any application, API or IoT device.

DefenseStorm

DefenseStorm

DefenseStorm is a Security Data Platform that watches everything on your network and matches it to your policies, providing cybersecurity management that is safe, compliant and cost effective.

Appvisory

Appvisory

Appvisory by MediaTest Digital is the leading Mobile Application Management-Software in Europe and enables enterprises to work secure on smartphones and tablets.

Fingerprint Cards

Fingerprint Cards

Fingerprint Cards develops and produces biometric components and technologies that verify a person’s identity through the analysis and matching of an individual’s unique fingerprint.

NESECO

NESECO

NESECO is an IT security integration and consulting firm providing security products, solutions, support, consulting, and training services.

Zen360Consult

Zen360Consult

Zen360Consult provides Advisory and Training services in the field of Cyber Resilience, which includes Cyber Security /ISMS and Business Continuity.

Innovent Recycling

Innovent Recycling

Innovent Recycling provides a secure IT recycling & data destruction service to all types of organizations across the UK.

Stratus Technologies

Stratus Technologies

Edge Computing solves the inherent challenges of bandwidth, latency, and security at edge locations to enable IIoT devices and data acquisition.

Triaxiom Security

Triaxiom Security

Triaxiom Security offers penetration testing, security audits, and strategic consulting customized to meet your needs.

CornerStone

CornerStone

CornerStone is an award winning, independent risk, cyber and security consulting firm providing a range of Risk Management, Security Design and Implementation Management Services.

Rausch Advisory Services

Rausch Advisory Services

Rausch delivers solutions that address compliance, enterprise risk, information technology and human resource capital.

Dimension Data

Dimension Data

Dimension Data is a leading African born technology provider operating in the Middle East and Africa, offering a portfolio of services including intelligent security solutions.

Nuance Communications

Nuance Communications

From revolutionizing the doctor-patient relationship to reinventing the way brands connect with their customers, Nuance technology helps organizations push the boundaries of what’s possible.

Techtron Business IT Services

Techtron Business IT Services

TECHTRON has been providing business IT services since 2004. Our focus is on SMBs and we are good at it. Our customers trust us, they love our high levels of service, and they love what we stand for.