News

2018-06-02

InfoWatch Launches M. East Cyberecurity Training Centre

A new Middle East-based centre will provide education and advanced training in cyber security, IoT, big data, artificial intelligence and blockchain.

2018-06-05

Ridge Global Cybersecurity Institute launched

Ex - US Homeland Security Chief launches of the Ridge Global Cybersecurity Institute, a go-to source for all cybersecurity related services.

2018-06-01

Digital Shock (£)

The 4th Industrial Revolution will create an integration of digital, physical and biological systems that will significantly change our world. (£)

2018-06-05

Cybercrime: Law Enforcement Must Get Serious

A crime is crime, whether the bad actor is throwing a brick or wielding a keypad. Police should treat online crimes and physical crimes the same.

2018-06-05

Playing Catch-Up With GDPR

Beyond the EU the GDPR regulation is expected to reshape how global organisations manage, share and protect their users’ personal data.

2018-06-05

Demand For Indian Cybersecurity Skills Rising Fast

A side effect of GDPR is to promote a surge in demand for cybersecurity skills in outsourced IT centres in India.

2018-06-04

Malta Under Large Scale Attack

As a well known offshore banking centre for Russian nationals, it is perhaps no surprise that Malta suffers a high number of cyber attacks.

2018-06-04

Action Fraud Reports A Sharp Rise In Fake TSB Activity

The UK online crime reporting service is seeing a big jump in suspicious messaging connected with the stricken customer IT systems of TSB Bank.

2018-06-04

Nation State Cyber Attacks Are An Act Of War

Top British law officer thinks hostile states targeting essential infrastructure & services should be treated in the same way as physical attackers.

2018-06-04

GDPR Is Now Effective

GDPR is a wake-up call for American companies to solidify best practices around their big data and data science initiatives.

2018-06-04

Japan’s Secret Spy Agency

Like any other advanced economic power, Japan operates a significant intelligence and surveillance apparatus. Here is an outline.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Concise Technologies

Concise Technologies

Concise Technologies provide specialist IT and telecoms solutions, support services, managed backup, disaster recovery, cyber security and consultancy to SME businesses across the UK and Europe.

Thales

Thales

Thales provides solutions, services and products that help its customers in the defence, aeronautics, space, transportation and digital identity and security markets to fulfil their critical missions.

Hewlett Packard Enterprise (HPE)

Hewlett Packard Enterprise (HPE)

HPE is an information technology company focused on Enterprise networking, Services and Support.

Japan Information Security Audit Association (JASA)

Japan Information Security Audit Association (JASA)

JASA is non-profit association active in developing and managing the quality of Information Security Auditing and Auditors in Japan.

Dice

Dice

Dice is a leading recruitment platform, helping technology professionals manage their careers and employers connect with highly skilled tech talent in specialist areas including cybersecurity.

Blockchain R&D Hub

Blockchain R&D Hub

Blockchain R&D Hub's mission is to serve the needs of blockchain ecosystem as the center of excellence for technology research and development.

Parameter Security

Parameter Security

Parameter Security is a provider of ethical hacking and information security services.

Inpher

Inpher

Inpher has pioneered cryptographic Secret Computing® that enables advanced analytics and machine learning while keeping data private, secure, and distributed.

Two Six Technologies

Two Six Technologies

Two Six Technologies delivers R&D, innovation, productization and implementation expertise in cyber, data science, mobile, microelectronics and information operations.

xorlab

xorlab

xorlab is a Swiss cybersecurity company providing specialized, machine-intelligent defense against highly engineered, sophisticated and targeted email attacks.

Valtix

Valtix

Valtix is the first and only multi-cloud network security platform delivered as a service that enables cloud teams to meet the most stringent security requirements in a cloud-first & simple way.

Primary Guard

Primary Guard

Primary Guard provides IT solutions and computing technologies that help minimize impact from cyber threats, improve business efficiency and maintain essential functions during or after a disaster.

OutKept

OutKept

OutKept offers the highest quality phishing simulation campaigns, supported by a community of ethical phishers, to build awareness, and maintain alertness.

Somos

Somos

From voice to messaging to fraud prevention and beyond, Somos are committed to developing innovative solutions that ensure that our ability to maintain trustworthy connections never stops.

Trovent Security

Trovent Security

Trovent was founded with a clear goal: to support medium-sized companies in significantly increasing their IT security level.

Runecast Solutions

Runecast Solutions

Runecast Solutions is a global leader in AI-powered risk mitigation, security, continuous compliance and more efficient IT operations management.