FREE TO VIEW


« Back to News

2016-04-13

People Are (Still) The Biggest Security Risks

Curiosity: It's better to think before you click.

2016-04-15

SMEs Underestimate The PR Damage Caused By A Cyber Breach

SMEs dangerously underestimate the impact of cyber attacks on their reputation, but can protect themselves.

2016-04-15

EU Cyber Agency Urges Action To Avoid Crisis

EU countries lack a harmonised framework to respond to the challenges of a large-scale cyber incident, according to security agency Enisa.

2016-04-18

Boardroom: Elevating Cybersecurity Discussions

As data breaches continue to rise, organizations, regardless of their size or industry they are in, must adopt a new mindset.

2016-04-13

Who’s in Charge When US Suffers A Cyberattack?

Is it NORTHCOM or CYBERCOM? CYBERCOM or the NSA—or both?

2016-04-18

FBI Says A Mysterious Hacking Group Has Had Access To US Government Networks For Years

Hacking group APT6 “have compromised and stolen sensitive information from various government & commercial networks” since 2011.

2016-04-14

Women in Cybersecurity

Women in Cybersecurity (WiCyS) has just held its third annual Women in Cybersecurity Event.

2016-04-18

Were Brussels Terrorists Trying To Build 'dirty bomb'

The ISIS terrorists who blew up Brussels airport and attacked the metro were secretly videotaping a Belgian nuclear official.

2016-04-15

Donald Trump Has A Plan for CyberWar

Donald Trump has elaborated some bold and belligerent foreign-policy prescriptions.

2016-04-12

UK Investigatory Powers Bill Will Cost £1bn To Implement

The UK Home Office has been told its plans to retain web-browsing history of all British citizens for 12 months would cost in excess of £1bn.

2016-04-13

The Next Decade Will Be About The Industrial Internet

Corporate giant GE has outlined some fundamental insights about the digital transformation efforts of industrial businesses.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ITQ

ITQ

ITQ is an IT consulting firm with a focus on the entire VMware-product portfolio with three main services: Professional Services, Support Services and Managed Services.

Radiant Logic

Radiant Logic

Radiant Logic is a market-leading provider of federated identity solutions based on virtualization, and delivers simple, logical, and standards-based access to all identities within an organization.

Cyber Fusion Center - Maryville University

Cyber Fusion Center - Maryville University

Maryville University Cyber Fusion Center is a virtual lab for working on real-world cyber security challenges.

Be Cyber Aware At Sea

Be Cyber Aware At Sea

Be Cyber Aware At Sea is a global maritime and offshore industry initiative to raise awareness and educate crew members and the offshore workforce.

SecureNinja

SecureNinja

SecureNinja provides professional training, certifications & professional services related to all facets of Information Technology and Cyber Security.

Sikur

Sikur

Sikur have developed a communication platform that sets new boundaries for corporate privacy and security.

Startups.be

Startups.be

Startups.be helps tech entrepreneurs to be successful by providing quality access to service providers, business partners, customers and investors.

ThriveDX

ThriveDX

ThriveDX, the world’s premier EdTech provider (formerly HackerU), champions digital transformation training as a means of empowering individuals to thrive in the age of digital disruption.

Whistic

Whistic

Whistic is a cloud-based platform that uses a unique approach to address the challenges of third-party risk management.

Cynance

Cynance

Cynance are an award-winning, independent cyber security specialist and part of the Transputec family of companies.

R3I Ventures - House of DeepTech

R3I Ventures - House of DeepTech

The House of DeepTech is an incubator for deeptech entrepreneurs that are transforming global industries. Areas of interest include cybersecurity.

Sparrow

Sparrow

Sparrow specializes in application security testing solutions to cope with new technology trends such as cloud, mobile, and DevSecOps.

Sencode Cyber Security

Sencode Cyber Security

Sencode provides a range of IT security solutions and services, including penetration testing and cyber awareness training to help mitigate the growing risks to your corporate infrastructure.

Gradient Cyber

Gradient Cyber

Gradient Cyber is a trusted cybersecurity partner specializing in small businesses and mid-market enterprises concerned about cybersecurity but lacking the staff to give it the attention it deserves.

SphereX Technologies

SphereX Technologies

SphereX is the first on-chain security solution for Web3 applications.

Assetnote

Assetnote

The Assetnote platform enables organizations to effectively map and continuously monitor their external attack surface.