News

2016-08-29

The Hidden Costs Of A Data Breach

Strengthening defenses against cyber-attackers is important. Companies must also prepare for reputational & financial damage lasting for years.

2016-08-29

Cyber War In Kashmir

An historic dispute over sovereignty in Kashmir is hotting and there is a growing cyber dimension.

2016-08-26

Artificial Intelligence Has Finally Emerged Into Real Life

Robotics is about embedding rules into a technological process. AI is about embedding analytics into the process.

2016-08-26

Where In The World Do The Cyber Villains Live?

Hackers work all around the world, but what's particularly surprising is how much the style of an attack depends on where it comes from.

2016-08-26

Cyber Spying All At Sea

Naval vessels intercept cyber information beyond national coastal boundaries, collecting emails and other Internet data, above & below the surface.

2016-08-26

Solutions To Automotive Cyber Hacking Risks

Hacking is now one of the auto industry’s biggest concerns, especially as modern cars add more electronic controls and infotainment systems.

2016-08-25

Cyber Insurance: A Digital Necessity

All businesses, large or small operate digitally in one form or another. They need to protect themselves against their cybersecurity risk.

2016-08-25

Too Much Information: Making Sense Of Big Data

The abundance of information online and across our devices can overwhelm even the most technically savvy individuals.

2016-08-25

What’s Your Personal Data Worth On The Dark Web?

Your personal information is going to be compromised at some point. How much is your ID, password or account number worth?

2016-08-25

Risky Business: Desktop Banking Declines As Users Switch To Apps

The use of internet banking on a computer has fallen for the first time as users switch to mobile apps.

2016-08-24

Made in Britain: Facebook's Drones

In a warehouse in Somerset UK, the latest phase in Facebook's bid for world domination has been taking shape.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

QATestLab

QATestLab

QATestLab is a leading International software testing company offering a full range of software testing services including security testing.

Hedgehog Security

Hedgehog Security

The key objective of Hedgehog is to provide simple, effective and affordable information security improvements that support your drive to increase productivity and profitability.

ODSC

ODSC

ODSC is a security systems integrator that provides services and expertise in identity management and access.

SoSafe

SoSafe

SoSafe empowers organizations to build a security culture and mitigate risk with its GDPR-compliant awareness programs.

ECOLUX

ECOLUX

ECOLUX is a professional IoT security service company committed to developing world-leading “IoT Lifecycle Security” technologies and products.

ISA Global Cybersecurity Alliance (ISAGCA)

ISA Global Cybersecurity Alliance (ISAGCA)

Objectives of the ISA Global Cybersecurity Alliance include the acceleration and expansion of standards, certification, education programs, advocacy efforts, and thought leadership.

Threat Status

Threat Status

Threat Status are a Threat Intelligence company. We are the developers of Trillion. A cloud based Security As A Service (SaaS) platform.

Alias Robotics

Alias Robotics

Alias Robotics is a robot cyber security company. We deliver cyber security solutions for robots and robot components.

Anterix

Anterix

Anterix is focused on empowering the modernization of critical infrastructure and enterprise businesses by enabling private broadband connectivity.

Cyber Management Alliance

Cyber Management Alliance

Cyber Management Alliance is closing the divide in cyberspace by bringing together the best qualities of thought leadership and operational mastery of cyber security management.

SpireTec Solutions

SpireTec Solutions

SpireTec Solutions is an IT management training company offering 1500+ courses with state of art training facilities backed by a team of industry experts in various domains including cybersecurity.

Cyberguardians

Cyberguardians

Cyberguardians is a team of experienced cybersecurity experts and consultants who always believe in the value and a high level of cybersecurity services to clients.

RB42

RB42

RB42 (formerly Nexa Technologies) provide cyber defense solutions (ComUnity, secure and encrypted messaging, detection of interception tools, etc) and cyber defense consultancy service.

Oxygen Technologies

Oxygen Technologies

Oxygen Technologies is a business systems strategy and integration company offering a variety of solutions to give our clients ways to work smarter not harder.

Tyto Athene

Tyto Athene

At Tyto Athene, we harness the power of technology to provide solutions that shape the future.

ViCyber

ViCyber

ViCyber is an Australian based company whose mission is to simplify and strengthen cybersecurity for all businesses, irrespective of size.