News

2016-04-04

Four Startup Companies That Are Harnessing AI In The Invisible Cyberwar

Examples of Cybersecurity startups working on automated systems they hope will be more effective than hiring human enterprise security teams.

2016-04-04

FBI Cancels Apple Court Hearing

The FBI has dropped the scheduled court hearing and showdown over its demands that Apple help unlock a terrorist’s iPhone.

2016-04-04

New Study Ranks Nations On Cyber Vulnerability

Data-mining experts have ranked the vulnerability of forty-four nations to cyberattacks and the results may surprise you.

2016-04-01

Apple's Questionable Victory Over the FBI

Apple has suffered one major casualty in its legal victory over the FBI: bragging rights over the iPhone’s security.

2016-04-04

Cars Really Are Increasingly Vulnerable To Cyberthreats

Modern cars are "increasingly vulnerable" to hacking after researchers proved it is possible to disable brakes and manipulate steering remotely.

2016-04-01

Ex-CIA Chief: ‘If we don’t handle China well, it will be catastrophic’

General Michael Hayden turned the CIA into a militarised force. He now thinks the obsession with counter-terrorism obscures more serious threats.

2016-03-30

Germany’s BND Intelligence Agency Is Cutting Cooperation With The NSA

Germany's BND has drastically cut cooperation with the NSA over covert US surveillance of European officials and companies.

2016-04-01

What Do UK Consumers Think About SMEs’ Cyber Security?

KPMG's Small Business Reputation & The Cyber Risk survey gives us valuable information about what consumers think about cyber security.

2016-03-31

5 Major US Hospital Hacks

In real-world war, combatants typically don’t attack hospitals. In the cyber realm, hackers have no such scruples.

2016-03-30

Blockchain – The Most Disruptive Invention Since The Internet

Very few people seem to realize that the blockchain will change every transactional process you know.

2016-03-30

Five Technology Trends To Change The World

Here are five trends that will have a transforming impact for business in the Intelligence Age.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Argus Cyber Security

Argus Cyber Security

Argus is the world’s largest automotive cyber security company, protecting connected cars and commercial vehicles from hacking.

Cyber Security Network

Cyber Security Network

Cyber Security Network provide specialist cyber security recruitment services.

Finnish Information Security Cluster (FISC)

Finnish Information Security Cluster (FISC)

FISC is an organization established by major Finnish information security companies to promote their activities nationally and internationally.

National Information Technology Development Agency (NITDA) - Nigeria

National Information Technology Development Agency (NITDA) - Nigeria

The National Information Technology Development Agency (NITDA) is committed to implementing the Nigerian National Information Technology Policy.

DefCamp

DefCamp

DefCamp is the most important annual conference on Hacking & Information Security in Central Eastern Europe.

Institute for Cybersecurity & Privacy (ICSP) -  University of Georgia

Institute for Cybersecurity & Privacy (ICSP) - University of Georgia

The goal of ICSP is to become a state hub for cybersecurity research and education, including multidisciplinary programs and research opportunities, outreach activities, and industry partnership.

Rwanda Information Society Authority (RISA)

Rwanda Information Society Authority (RISA)

RISA is at the forefront of all ICT project implementation, research, infrastructure and innovation within the ICT sector in Rwanda.

Cancom

Cancom

CANCOM group is one of the leading providers of IT infrastructure and IT services in Germany and Austria. Solution areas include network security.

Forgepoint Capital

Forgepoint Capital

ForgePoint Capital is a premier venture investor for early stage cybersecurity companies.

Macquarie Telecom Group

Macquarie Telecom Group

Macquarie Telecom is Australia's datacentre, cloud, cyber security and telecom company for mid-large business and government customers.

SecureNation

SecureNation

SecureNation offers a wide variety of cutting-edge technologies and IT services to address almost any of your information security, network security and information assurance needs.

Quintillion Consulting

Quintillion Consulting

Quintillion Consulting is a strategic risk based consulting firm. We help companies safeguard the core business and IT capabilities that deliver competitive advantage.

Seadot Cybersecurity

Seadot Cybersecurity

Seadot offer cybersecurity services to organizations with a high demand for regulatory compliance and security.

Drumz

Drumz

Drumz plc is an investment company whose investing policy is to invest principally but not exclusively in the technology sector within Europe.

SeeMetrics

SeeMetrics

SeeMetrics is an automated cybersecurity performance management platform that integrates security data and business objectives into a simple interface.

Klarytee

Klarytee

Protect your data wherever it goes. Klarytee is a SaaS platform that builds security into sensitive content to enable granular control in AI, public cloud and SaaS.