FREE TO VIEW


« Back to News

2019-04-10

What is The Canadian Institute For Cybersecurity & Why Does It Matter?

The new Canadian Institute for Cybersecurity is the first national institution of its kind to take such a multidisciplinary approach to cybersecurity.

2019-04-09

Naval Hacker Team To Fight Drones

The US Navy is assembling a team of engineers, researchers and some hackers to develop ways to fight off swarms of cheap commercial drones.

2019-04-09

Top Blockchain Challenges For CIOs

The experts at Gartner think the world is just five years away from blockchain becoming mainstream and CISOs must adapt to take advantage.

2019-04-09

Britain's National Cyber Security Strategy Beyond 2021

The UK is halfway through its 2nd National Cyber Security Programme and focus is beginning to shift to considering the future strategy beyond 2021.

2019-04-09

FBI Takes Too Long To Alert Victims

Auditors report that FBI agents often drag their feet in notifying victims they’ve been breached, leaving networks unnecessarily vulnerable.

2019-04-08

Financial Apps Are Vulnerable

New research reveals widespread security deficiencies indicating that financial institutions are failing when it comes to protecting their apps.

2019-04-08

The Brexit Shaped Gap In UK Cyber Security

Leaving the EU could mean a whole new cyber security regime for the UK and firms need to understand how the changes might affect them.

2019-04-08

British Politicians Need To Better Understand Cyber Security

As critical public services like transport, energy, and our election process are being digitised, cybersecurity is becoming entwined in politics.

2019-04-05

The UK Needs Data Driven Policing

Electronic social change is putting significant pressure on policing. As criminals go digital, hard-pressed police forces need to follow them.

2019-04-04

Identity Management Fundamentals

Identity management is fundamental to information security. Why is it that so many organizations are terrible at it? By Evan Francen

2019-04-08

The EU’s Copyright Directive Risks Creating Two Internets

The EU Parliament’s approval of the Copyright Directive creates substantial new controls on what can be shared online. That's a problem.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

AON

AON

Aon is a leading global provider of risk management (including cyber), insurance and reinsurance brokerage, human resources solutions and outsourcing services.

CERT.AZ

CERT.AZ

The national Cyber Security Center of the Republic of Azerbaijan.

CyberSource

CyberSource

CyberSource provides online payment and fraud management services for medium and large-sized merchants.

Operational Center for Information Systems Security (COSSI)

Operational Center for Information Systems Security (COSSI)

COSSI is responsible for the detection and mitigation of cyber attacks directed at French Government information systems.

Sera-Brynn

Sera-Brynn

Sera-Brynn is one of the highest-ranked, pure-play cybersecurity compliance and advisory firms in the world.

Greylock Partners

Greylock Partners

Greylock Partners is a leading venture capital firm based in Silicon Valley. We invest in all sectors of enterprise software technology including applications, cloud/SaaS, networking and security.

Huntress Labs

Huntress Labs

Huntress provides managed threat detection and response services to uncover and address malicious footholds that slip past your preventive defenses.

Port53 Technologies

Port53 Technologies

Port53 Technologies is focused on delivering enterprise-grade, cloud-delivered security solutions that are easy to deploy, simple to manage and extremely effective.

North American International Cyber Summit

North American International Cyber Summit

The North American International Cyber Summit brings together experts from around the globe to provide timely content and address a variety of cybersecurity issues impacting the world.

IT Acceleration

IT Acceleration

IT Acceleration is a full-service IT management and support, IT compliance and Digital Forensics company.

Zephyr Project

Zephyr Project

The Zephyr Project strives to deliver the best-in-class RTOS for connected resource-constrained devices, built to be secure and safe.

Network Perception

Network Perception

Network Perception proactively and continuously assures the security of critical OT assets with intuitive network segmentation verification and visualization.

Halogen Group

Halogen Group

Halogen Group is the leading Security Solutions Provider in West Africa. Services encompass Physical Security, Electronic Security, Virtual & Cyber Security, Risk Assessments and Training.

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).

8com

8com

8com is an established Managed Security Service Provider (MSSP) with over 75 employees and customers in over 40 countries.

Secolve

Secolve

Secolve is Australia’s next generation OT specialist cyber security firm, working with key industries to protect the nation’s critical infrastructure.