News

2018-10-30

IBM Spends $34B To Buy Red Hat

Older technology companies like IBM are turning to deal-making to gain scale and fend off competitors in cloud computing.

2018-10-30

Britain To Spend Up To £1B Extra On Cyber Warfare

Britain has decided to spend big on modernising its defence infrastructure, including building expertise in offensive cyber warfare methods.

2018-10-30

The Haunting Horror Story Of Cybercrime

Cybercrime: Darkness falls across the land, the midnight hour is close at hand. Halloween is upon the scene and frightening things are unforeseen.

2018-10-29

Amazon Scraps AI Recruiting Tool That Showed Bias Against Women

Amazon's machine-learning specialists have uncovered a big problem: their new recruiting engine did not like women.

2018-10-30

Arrest Of Intelligence Officer Sparks Fears Of Chinese Hacking Attack

Top figures in the infosec industry fear that the recent arrest of a top Chinese intelligence officer will spark an increase in cyber-attacks.

2018-10-30

Facebook Sued Over Video Viewing Figures

In the dash for business growth Facebook miscounted audiences. Now, advertisers are suing them for unfair business conduct and fraud.

2018-10-31

Cyber Attack On Weapon Systems Is Easier Than You’d Think

All US weapons that the DoD tested between 2012 and 2017 have “mission critical” cyber vulnerabilities, claims a new report.

2018-10-26

Facebook Wants To Buy A Cybersecurity Firm. Which One?

Facebook quickly wants to get its hands on security tools that will easily integrate with its current services and has a big acquisition in mind.

2018-10-26

Microsoft, Amazon CEOs Vow To Continue Defense Work

Google’s decision not to bid for the Pentagon’s $10 billion JEDI cloud contract draws criticism from CEOs of rival tech companies.

2018-11-01

In Blockchain There’s No Checkmate

Blockchain technology is arguably one of the most significant innovations for decades. As it develops, it's only going to get smarter and better.

2018-10-25

NATO Cyber Command Fully Operational In 2023

A new NATO military command centre should be fully staffed in 2023 and able to mount its own cyber-attacks.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ON-DEMAND WEBINAR: 2024 and beyond: Top six cloud security trends

ON-DEMAND WEBINAR: 2024 and beyond: Top six cloud security trends

Learn about the top cloud security trends in 2024 and beyond, along with solutions and controls you can implement as part of your security strategy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Concise Technologies

Concise Technologies

Concise Technologies provide specialist IT and telecoms solutions, support services, managed backup, disaster recovery, cyber security and consultancy to SME businesses across the UK and Europe.

DataSunrise

DataSunrise

DataSunrise Data-Centric high-performance security software protects the sensitive data in real-time in cloud or on premises, and helps organizations to stay compliant.

Introspective Networks

Introspective Networks

Introspective Networks (IN) is a Cybersecurity company focusing on securing data in the network and automating knowledge work to decrease vulnerability points to critical infrastructure.

Crosscheck Networks

Crosscheck Networks

Crosscheck products allow you to test your APIs across different protocols and message formats with functional automation, performance, and security testing capabilities.

Terranova Security

Terranova Security

Terranova is dedicated to providing information security awareness programs customized to your internal policies and procedures.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Center for Applied Cybersecurity Research (CACR) - University of Indiana

Center for Applied Cybersecurity Research (CACR) - University of Indiana

CACR serves Indiana and the nation by tackling cyber risk in research and other unusual environments through agile, holistic, principle-based cybersecurity.

Mjenzi Cloud

Mjenzi Cloud

Mjenzi Cloud is a provider of cloud IaaS solutions including managed backup services, affordable & secure cloud virtual compute/storage/compute services, bare-metal services and cloud security.

Cyturus Technologies

Cyturus Technologies

Cyturus Technologies delivers cybersecurity business risk quantification services using our proprietary Adaptive Risk Model (ARM).

Bionic

Bionic

Bionic is an agentless way to get control over your increasingly complex applications so you can manage, operate, and secure them faster and more efficiently.

Synamic Technologies

Synamic Technologies

Synamic Technologies was founded in 2018 as a start-up to automate cyber security processes. Our CISOSCOPE product automates vulnerability management, risk management and compliance.

Arcturus Security

Arcturus Security

Arcturus is a CREST-approved cyber security consultancy created by experts in the field.

Node4

Node4

Node4 provide advanced, cloud-led digital transformation solutions, delivered with technical expertise, innovation and exceptional service to drive your business forwards.

Transatlantic Cyber Security Business Network

Transatlantic Cyber Security Business Network

The Transatlantic Cyber Security Business Network is a coalition of UK and US cyber security companies which facilitates collaboration to help address critical cyber security challenges.

FTx Identity

FTx Identity

FTx Identity is the world's most advanced age verification technology (AVT) and identity management system.

Vigilant Ops

Vigilant Ops

Vigilant Ops is a leader in Software Bill of Materials (SBOM) Automation. A proactive approach to cybersecurity with continuous vulnerability monitoring.