News

2015-12-02

Cyber Threat From Within

A rogue employee can do at least as much damage as a rogue nation.

2015-12-01

The Road to Measuring and Interpreting Big Data

Think tank Demos and market research firm Ipos MORI are taking a close look at social media using big data analytic methods.

2015-12-01

Former NSA Expert ‘We are in the Cyber War’

Security mechanisms cannot keep up with the threats that both state actors and non-state actors like Anonymous are producing.

2015-12-01

Presidential Candidate John McAfee Talks Cyber

When it comes to eccentric personalities and colorful pasts, Donald Trump has nothing on John McAfee.

2015-12-01

IoT Attacks and Evasion Will Characterize 2016

The Internet of Things along with predictions of new malicious tactics & strategies will create unique challenges in 2016.

2015-12-05

IBM's CEO On Hackers: 'Cyber Crime Is The Greatest Threat To Every Company In The World'

"... cyber crime, by definition, is the greatest threat to every profession, every industry, every company in the world.”

2015-12-04

Reverse ATM Fraud: How It Works

Russian hackers have adopted a new technique, dubbed the Reverse ATM Attack to steal Millions of dollars from ATMs of financial institutions.

2015-11-27

ISIS Video Threatens US Capital

ISIS propagand video stirs up fears of a repeat 9/11 attack.

2015-11-27

Nuclear Weapons Subs Could Be Vulnerable to Cyber-attack

Britain’s Trident nuclear weapons system may turn out to be obsolete or unusable because of vulnerability to 'full spectrum' cyber assault.

2015-12-04

CIA Say Edward Snowden 'taught ISIS to avoid detection'

Former CIA deputy director claims Snowden is directly implicated in the rapid expansion of ISIS in the months after his first leaks in 2013.

2015-11-25

Did China Authorize Major High Level Hack on US & It’s Allies?

High Alert: Google announces discovery of a phishing scam based in China, targeting email passwords of senior government officials.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Veeam

Veeam

Veeam is the leader in intelligent data management for the Hyper-Available Enterprise.

Backup Systems

Backup Systems

Backup Systems is a leading backup and disaster recovery systems provider across the UK.

Mitol PerfectBackup

Mitol PerfectBackup

Mitol PerfectBackup provide Enterprise Online Backup, Disaster Recovery and Cloud Computing Services.

XCure Solutions

XCure Solutions

XCure Solutions are a Finnish company specializing in data security, data protection and data recovery.

Cybersecurity Credentials Collaborative (C3)

Cybersecurity Credentials Collaborative (C3)

C3 provides a forum for collaboration among vendor-neutral information security and privacy and related IT disciplines certification bodies.

Guidewire

Guidewire

Guidewire Cyence™ Risk Analytics is a cloud-native economic cyber risk modeling solution built to help the insurance industry quantify cyber risk exposures.

Norwest Venture Partners (NVP)

Norwest Venture Partners (NVP)

Norwest Venture Partners offer entrepreneurs a broad range of services to help them build their businesses at every stage of growth. Key sectors include AI, Infrastructure, SaaS and Security.

Reed

Reed

reed.co.uk is a leading job site in the UK, providing a full online service for anyone looking for a new job.

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation (EIF) of Armenia is one of the largest technology business incubators and IT development agencies in the region.

SkyePoint Decisions

SkyePoint Decisions

SkyePoint Decisions is a leading Cybersecurity Architecture and Engineering, Critical Infrastructure and Operations, and Applications Development and Maintenance IT service provider.

Noblis

Noblis

Noblis is a dynamic science, technology, and strategy organization dedicated to creating forward-thinking technical and advisory solutions in the public interest.

Fortified Health Security

Fortified Health Security

Fortified’s team of cybersecurity specialists is dedicated to helping healthcare providers, payers and business associates protect their patient data across the Fortified Healthcare Ecosystem.

LANCOM Systems

LANCOM Systems

LANCOM Systems is the leading European manufacturer of secure, reliable and future-proof networking (WAN, LAN, WLAN) and firewall solutions for the public and private sectors.

Castlepoint Systems

Castlepoint Systems

Castlepoint Systems is a pioneer in information governance, risk and compliance as a service. An all-in-one solution offering powerful risk management, built in compliance, cybersecurity and audit.

ERCOM

ERCOM

Ercom, a subsidiary of the Thales Group, is a French company known for its mobility security solutions.

Triskele Labs

Triskele Labs

Triskele Labs deliver services including Penetration Testing, Compliance and Risk Management through to 24*7*365 Security Operations and outsourced Cybersecurity Managers.