FREE TO VIEW


« Back to News

2019-01-29

Connecting African IT & Software Developers With Top Tech Companies

Worldwide demand for IT and software engineers far exceeds supply and Andela is helping businesses overcome the technologist shortage.

2019-01-29

Millions Of Secret Bank Records Leak Online

A server security lapse at a Texas data & analytics company for the financial industry has left information on 24 million documents exposed.

2019-01-28

The Future Of War is Cyber

In future, most wars will be waged via computers, servers and digital weapons. Is the United States really prepared for what is coming?

2019-01-25

Disinformation: Facebook Shuts Hundreds Of Russia-Linked Accounts

Facebook has shut down 75 accounts, closing 289 pages, representing 790,000 followers, due to "coordinated inauthentic behavior".

2019-01-25

Australian Defence Chief Issues Cybercrime Warning

Australia's military chief has warned European officials of the ever-present threat posed by cyber espionage and intellectual property theft.

2019-01-25

AI Tools Can Help Police Fight Crime

AI-based cognitive computing can organise evidence like unstructured audio and video data, transforming it into actionable intelligence.

2019-02-19

Utility Week Cyber Security & Resilience Conference

12 March 2019 | London. The only UK event bringing together resilience, risk, cyber & IT security executives from the utility sector.

2019-01-24

The Age Of Surveillance Capitalism Dawns

“Surveillance capitalism” works by providing free services that people use, enabling the providers to monitor user behaviour in astonishing detail.

2019-01-24

GCHQ Introduces Women Only Cybersecurity Training

GCHQ thinks the lack of women in cybersecurity is part of the bigger picture of a gender imbalance in science, technology, engineering and maths.

2019-01-23

What Financial Services Executives Need to Know About Data-Security

The financial services industry experiences 35% of data breaches, earning it the unflattering title of the most-breached sector. With good reason.

2019-01-23

The US Pentagon Has Numerous Security Gaps

The US Defense Department’s IT systems have 200+ vulnerabilities that put the Pentagon at risk of hacks and data theft.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NextLabs

NextLabs

NextLabs provides data-centric security software to protect business-critical data and applications.

Swiss Cyber Storm

Swiss Cyber Storm

Swiss Cyber Storm is a non profit organization hosting the international Swiss Cyber Storm Conference and running the Swiss part of the European Cyber Security Challenges.

KLDiscovery

KLDiscovery

KLDiscovery is a global leader in delivering best-in-class eDiscovery, information governance and data recovery solutions.

KOS-CERT

KOS-CERT

KOS-CERT is the national Computer Incident Response Team for Kosovo.

Clari5

Clari5

Clari5 redefines real-time, cross channel banking Enterprise Fraud Management using a central nervous system approach to fight financial crime.

Altipeak Security

Altipeak Security

Altipeak Security provide Safewalk - a flexible and robust authentication platform through which we offer improved security to SMBs, corporates, banks, insurance companies, healthcare and more.

Capsule8

Capsule8

Capsule8 is the only company providing high-performance attack protection for Linux production environments.

OpenZeppelin

OpenZeppelin

OpenZeppelin builds developer tools and performs security audits for distributed systems that power multimillion-dollar economies.

ShieldApps

ShieldApps

ShieldApps comprehensive suite of products is designed to protect your personal devices from privacy threats, including hacking attempts, online tracking, fingerprinting, phishing, malware, and more.

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center of Vietnam has a central monitoring function and is a technical focal point for monitoring and supporting information security for people, businesses and systems.

BlueSteel Cybersecurity

BlueSteel Cybersecurity

BlueSteel is a compliance consulting firm that leverages deep system, data and application expertise to build sustainable cybersecurity solutions.

Guardey

Guardey

Guardey protects thousands of SME's environments. Whether your team works at the office, at home, at the customer or remotely. We protect your business. We do this in an accessible and affordable way.

Commvault

Commvault

Commvault's data protection and information management solutions help companies protect, access and use all of their data, anywhere and anytime.

TuxCare

TuxCare

TuxCare make Linux more secure. We take care of Linux so that organizations can use Linux to support environments that require high levels of Cybersecurity, stability, and availability.

Alchemy Security Consulting

Alchemy Security Consulting

Alchemy Security Consulting specialise in offensive and defensive cyber security. We find the weak link in your security so you can patch it up fast and avoid being hacked.

Amplifier Security

Amplifier Security

Amplifier Security are on a mission to empower security teams to modernize their practice by connecting the dots between their security stack and their people.