News

2018-07-30

Safeguarding 'the right to be forgotten'

The 'right to be forgotten' is a fundamental human right and recent legislation like the GDPR is an attempt to establish this right for EU citizens.

2018-07-30

The Cyber Security Intelligence Network

BAE Systems has launched a new industry forum and lobbying group called The Intelligence Network to address increases in cyber-attacks.

2018-07-30

What is Digital Twin Technology?

Digital Twin technology has moved beyond manufacturing and into the merging worlds of the IoT, Artificial Intelligence and Data Analytics.

2018-07-27

Maintaining GDPR Compliance

GDPR compliance efforts by many organisations are not just a work in progress, in many cases the work is just beginning.

2018-07-27

Help The Aged: Indian Cops Give Cybersecurity Tips

Police workshops on the latest ATM fraud techniques and phishing, how to protect users' money and what to do in case they fall victim.

2018-07-27

Why Is Rural Broadband Access A Problem?

Only 55 percent of people living in US rural areas have access to the broadband speeds that are available to 94 percent of the urban population.

2018-07-26

Suspected Russian Hackers Attack ProtonMail

ProtonMail's encrypted network has been under sustained pressure caused by DDoS attacks traced to a group claiming to have ties with Russia.

2018-07-26

Electronic Warfare Is Expanding

The US is building up electronic warfare capabilities with techniques developed specifically to counter Russian advances in Europe.

2018-07-25

Dubai Launches First Standard For Driverless Cars

Dubai plans to transform 25 percent of its transport system to autonomous mode by 2030 and is setting new guidelines for self-driving vehicles.

2018-07-25

AI Will Thrash Employment

Some estimates suggest more than 400 million people worldwide could be looking for work by 2030.

2018-07-24

Hacking Via The Cloud

Chinese hackers launched a big 2017 espionage campaign targeting cloud service supplier’s networks, rather than attacking companies directly.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

QTS

QTS

QTS Realty Trust, Inc. is a leading provider of secure, compliant data center, hybrid cloud and managed services.

Ciklum

Ciklum

Ciklum provide specialist software QA and testing services including Security QA and Performance QA, QA Automation and Manual QA.

Fidus Information Security

Fidus Information Security

Fidus is a team of security professionals providing Penetration Testing and Cyber Security Consulting services throughout the UK and worldwide.

Resilia

Resilia

RESILIA is a comprehensive portfolio of tools and training to help your organization achieve global best practice in cyber security.

Information and Communication Technology Authority (ICT Authority) - Kenya

Information and Communication Technology Authority (ICT Authority) - Kenya

The ICT Authority is responsible for enforcing ICT standards in Government and ensuring information security.

th4ts3cur1ty.company

th4ts3cur1ty.company

th4ts3cur1ty.company specialize in delivering intelligence lead adversary emulation purple teaming & the bespoke building of Security Operation Centers.

Renesas Electronics

Renesas Electronics

Renesas Electronics delivers trusted embedded design innovation with solutions that enable billions of connected, intelligent devices to enhance the way people work and live - securely and safely.

TES

TES

TES is a provider of IT Lifecycle Services, offering bespoke solutions that help customers manage the commissioning, deployment and retirement of Information Technology assets.

Augusta HiTech

Augusta HiTech

Augusta Hitech is a focused product development, software services and technology consulting company. Our Vision is to become the most socially impactful and innovative technology company in the world

Space ISAC

Space ISAC

Space ISAC is the only all-threats security information source for the public and private space sector.

Bleam Cyber Security

Bleam Cyber Security

Bleam is a leading provider of Managed Cyber Security Services and Information Security consulting. We deliver enterprise class security services to UK SME’s to stop data breaches.

Iconium Software

Iconium Software

DataLenz by Iconium offers continuous and real-time tracking of your data assets delivering you the tools you need to successfully reach and maintain your target security standards.

TheHive Project

TheHive Project

TheHive Project is a Scalable, Open Source and Free Security Incident Response Platform for SOC, CSIRT and CERT teams.

Hush

Hush

Hush is a premium privacy service that gives people unprecedented visibility and control of their digital footprint. Hush assesses threats, and goes to work to eliminate digital risks on your behalf.

Zeta Sky

Zeta Sky

Zeta Sky offers a full range of IT and cyber-security services for your business.

Oduma Solutions

Oduma Solutions

Oduma Solutions is a wholly owned Ghanaian Cybersecurity company that offers information security services to organisations seeking to improve their security posture.