News

2018-07-24

Mitigating IoT Cyber Risks: Training Is The First Step

It is vital to educate everyone in the risks involved with adopting increased IoT connectivity and how it can be mitigated.

2018-07-23

Darktrace - From Cybersecurity Start-Up To Unicorn

Darktrace has been named Europe's most promising tech company with a $1.25 billion valuation and contracts secured worth $400m.

2018-07-23

No More Asylum For Julian Assange

Ecuador is planning to withdraw its political asylum for Assange, eject him from its London embassy & might turn him over to the British authorities.

2018-07-21

Trump Blames Obama For Russian Cyber-Attack

US President Donald Trump has blamed Barack Obama for failing to prevent Russia’s 2016 cyber-attack on democratic email servers.

2018-07-23

NZ Cyber Security Challenge Simulates Drone Attacks

Around 400 aspiring cybercrime fighters in New Zealand will attempt to infiltrate a horde of killer drones, manufactured by a criminal group.

2018-07-23

Kremlin Hacking Crew Take A 'Roman Holiday'

Researchers say a Kremlin-linked hacking group was behind a new cyber-espionage campaign they believe was targeted at the Italian military.

2018-07-23

UK Launches Consultation To Develop Cybersecurity Profession

The UK Government has launched a consultation into developing the cybersecurity profession to support the National Cyber Security Strategy.

2018-07-20

Cyber Threat Warnings ‘Blinking Red’

US intelligence chief fears urgent cyber threats coming from Russia, China, Iran & N Korea as well as criminal networks and individual hackers.

2018-07-17

Cybersecurity Awareness & Compliance Training – That’s Bob’s Business

A company specialising in cybersecurity awareness that helps organisations become GDPR compliant has won a Royal Competition.

2018-07-20

Android Abuse: EU Fines Google $5.1 Billion

The EU is taking aggressive regulatory action against the US technology giant that may cause lasting changes to the smartphone industry.

2018-07-24

Quantum Computing Is Becoming Reality

The first thing to know about quantum computing is that it won’t displace traditional, or ‘classical’ computing…Yet…

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

BH Consulting

BH Consulting

BH Consulting we are a vendor independent consulting firm providing market leading range of information security services focused on data protection and cybersecurity.

Senetas

Senetas

Senetas is a leading developer and manufacturer of certified high-assurance encryption solutions, dedicated to protecting network transmitted data without compromising performance.

Joe Security

Joe Security

Joe Security specializes in the development of automated malware analysis systems for malware detection and forensics.

Digital Transformation EXPO (DTX)

Digital Transformation EXPO (DTX)

Digital Transformation EXPO showcases the latest technology and insight from the world’s leading brands and experts in DX.

PBOSecure

PBOSecure

PBOSecure is a dynamic and progressive IT consultancy company specializing in IT and Industrial Control System (ICS) security.

Pipeline Security

Pipeline Security

Pipeline Security protects businesses with real-time threat data, threat detection & prevention, continuous cyber security monitoring and security analytics.

Defensity

Defensity

Defensity offer bespoke & pre packaged IT Security Solutions for Small business to help companies reduce overall IT related risk.

Hudson Cybertec

Hudson Cybertec

Hudson Cybertec are an internationally recognized Subject Matter Expert for cyber security in the Industrial Automation & Control Systems (IACS) domain.

OSIbeyond

OSIbeyond

OSIbeyond provides comprehensive Managed IT Services to organizations in the Washington D.C., MD, and VA area including IT Help Desk Support, Cloud Solutions, Cybersecurity, and Technology Strategy.

Sekuro

Sekuro

Sekuro is your leading governance and cyber security partner. Building organisational resilience. Enabling fearless innovation.

Winbond Electronics

Winbond Electronics

Winbond is a Specialty memory IC company. Product lines include Code Storage Flash Memory, TrustME® Secure Flash, Specialty DRAM and Mobile DRAM.

Institute for Pervasive Cybersecurity - Boise State University

Institute for Pervasive Cybersecurity - Boise State University

Boise State University’s Institute for Pervasive Cybersecurity is a leader of innovative cybersecurity research and advancement in Idaho and the region.

Trellix

Trellix

Trellix is an extended detection and response (XDR) solutions provider created from a merger of McAfee Enterprise and FireEye Products.

Accops Systems

Accops Systems

Accops enables secure and instant remote access to business applications from any device and network, ensuring compliant enterprise mobility.

Stack Identity

Stack Identity

Stack Identity protects access to cloud data by prioritizing identity and access vulnerabilities via a live data attack map.

BluTinuity

BluTinuity

BluTinuity is a premier management consulting firm with a passion for information security, business continuity, incident response, disaster recovery, and HIPAA security.