FREE TO VIEW


« Back to News

2020-01-14

The Cyber Security Employment Outlook In 2020

The demand for Cyber Security people of all skill levels continues to climb and there has never been a better time to start on this career path.

2020-01-15

Online Bank Fraud Is Up 40% In The UK

Online fraud in Britain is increasing and criminals are using sophisticated hacking methods to access victims's financial information and passwords.

2020-01-20

AI Satellite Image Analysis Will Be Regulated

Satellite imaging and intelligence gathering programs are being taken to an entirely new level by the introduction of AI-driven technology.

2020-01-20

Five Risks That Will Define Cyber Security In 2020

2019 was a bad year for data security and there is no indication that 2020 will be any better. Here are five big risks that endanger company data.

2020-01-17

The Scope Of A Cyber Security Audit

A false sense of security is prevalent across many organisations and is one of the major reasons why cyber criminals continue to be so successful.

2020-01-17

Artificial Intelligence Is Transforming Cyber Security

AI applications can enable organisations to detect, prevent or react to emerging cyber threats more promptly and more effectively than ever before.

2020-01-16

Smart Cities Already Exist

A 'smart city' is a framework for living that is totally connected to the Internet, with the infrastructure dependent on remaining connected.

2020-01-14

Artificial Intelligence & Automation Impact On Legal Jobs

Artificial Intelligence is changing the practice of law and the outcome is focused on amplifying human decision-making rather than replacing it.

2020-01-13

WEBINAR: How to improve security visibility and detection-response operations in AWS

Thursday, January 30 2020 | 11:00AM PT (2:00PM ET) How to reduce noise from security alerts & prioritize incidents more effectively.

2020-01-13

Disconnected: Russia Tests Its Own Internet

Russia has successfully tested a country-wide alternative to the global Internet, restricting the points connecting its network to the rest the world.

2020-01-13

Artificial & Augmented Intelligence Is Re-Making Banking

Financial services businesses are investing heavily in AI to produce groundbreaking changes and a rise in customer-centricity will be foremost.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Teradata

Teradata

Teradata is a leading provider of enterprise big data analytics and services. Applications include Cyber Security Analytics.

CERT-IS

CERT-IS

CERT-IS is the national Computer Emergency Response Team for Iceland.

techUK

techUK

techUK represents companies operating in the tech sector in the UK. Focus areas cover all aspects of ICT including cyber security.

Ledger

Ledger

Ledger is a leader in security and infrastructure solutions for cryptocurrencies and blockchain applications using its proprietary technology.

National Centre for Cyber Security (NCCS) - Pakistan

National Centre for Cyber Security (NCCS) - Pakistan

National Centre for Cyber Security (NCCS) undertakes cyber security research and plays a leading role in securing Pakistan’s Cyberspace.

DataCloak

DataCloak

DataCloak is an innovation company that focus on providing enterprise data-in-motion security solutions based on zero-trust security technology.

KBR

KBR

To help governments and other agencies to combat cyber threats, KBR is safeguarding their most valuable systems with sophisticated tools, hardware and training.

Field Effect Software

Field Effect Software

Field Effect Software build sophisticated and integrated IT security, threat surface reduction, training and simulation capabilities for enterprises and small businesses.

Vigilant Technology Solutions

Vigilant Technology Solutions

Vigilant is a global cyber security technology company offering solutions to manage entire IT & cyber security lifecycles.

Reflectiz

Reflectiz

Reflectiz empowers digital businesses to make all web applications safer by non-intrusively mitigating any website risks without a single line of code.

Citadel Cyber Security

Citadel Cyber Security

Citadel is a leading 'One Stop Shop' provider of consulting services in cyber and information security. Our experts operate in hundreds of business organizations in Israel and around the world.

Nasuni

Nasuni

The Nasuni File Data Platform offers the protection, detection, and recovery of file shares from ransomware attacks or random disasters within minutes.

CloudScale365

CloudScale365

CloudScale365 offers state-of-the-art managed IT services and cloud, hosting, security, and business continuity solutions.

BreachBits

BreachBits

BreachBits are on a mission to deliver world-class cyber risk insights continuously at scale in situations where knowing the true risk truly matters.

Nightwing

Nightwing

Nightwing is the intelligence services company that continually redefines the edge of the possible to keep advancing our national security interests.

Pvotal Technologies

Pvotal Technologies

Pvotal Technologies engineer complex, automated processes aligned with best AIOps, BizDevOps, DevSecOps, CloudOps, and ITOps practices.