News

2016-12-14

Behavior Analytics Tools For Cyber-Security

Behavior Analytics is the hot new proposition in enterprise cybersecurity, used to detect abnormal patterns in network data.

2016-12-14

Mastercard Hypes Artificial Intelligence

Mastercard have deployed 'Decision Intelligence' to scrutinise real time transactions. That sounds impressive - is it?

2016-12-14

Amazon Is Using AI To Transform Retail

Amazon uses machine learning, computer vision, sensors and deep learning in it's first actual shop to create what is calls the smart store.

2016-12-12

Russia Has Foiled Cyberattacks By A Foreign Spy Agency

A "large-scale" cyberattack by foreign intelligence services meant to destabilise the country’s financial system has been thwarted.

2016-12-15

People Are Saying Machine Learning Will Reduce Cyber-Crime

Global annual cybercrime costs will grow from $3 trillion in 2015 to $6 trillion annually by 2021 it is predicted. Can machines fix that?

2016-12-14

Surprise: N Korea Hacked S Korea Cyber Command

N Korea appears to have hacked S Korea's cyber command in what could be the latest cyberattack against Seoul.

2016-12-14

An Entire Anti-Drone Industry Is Emerging

New tools will enable drone detection, tracking, identification, disabling, even hacking and hijacking unwanted drones as they fly.

2016-12-19

Medical Implants Can be Hacked

Research shows it is possible to transmit life-threatening signals to implanted medical devices with no prior knowledge of how the devices work.

2016-12-19

British Police - Stay Safe From Cyber Crime This Christmas

10 Top Tips: Police advice on how to stay on guard and not fall victim to cyber crime this Christmas.

2016-12-15

Six Cyber Predictions For 2017

McAfee Labs 2017 Threats Predictions report gives government IT managers a heads up on what to expect next year.

2016-12-16

Self - Flying Aircraft Take To British Skies

A pilotless plane is being prepared for testing in UK airspace to help refine systems that control autonomous aircraft.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking, a Hewlett Packard Enterprise company, is a leading provider of next-generation network access solutions for the mobile enterprise.

QA Systems

QA Systems

QA Systems provides software testing solutions for safety and business critical sectors and software safety and security standards.

6cure

6cure

The 6cure Threat Protection solution eliminates malicious traffic to critical services in real time and protects against DDoS attacks.

Excelerate Systems

Excelerate Systems

Excelerate Systems is a leading provider of IT services with a focus on Big Data, Cloud Services and Security.

DCX Technology

DCX Technology

Recognized as a leader in security services, DXC Technology help clients prevent potential attack pathways, reduce cyber risk and improve threat detection and incident response.

Adarma Security

Adarma Security

Adarma are specialists in threat management including SOC design, build & operation.

BlackDice Cyber

BlackDice Cyber

Threat Intelligence is only part of the solution. Our solution matches threats to vulnerabilities and automatically takes remedial action against compromised apps, devices and websites.

Arkphire

Arkphire

Arkphire provide solutions across every aspect of IT to help your business perform better.

Tech Vedika

Tech Vedika

Tech Vedika has access to technical guidance, training and resources from AWS to successfully undertake solution architecture, application development, application migration, and managed services.

Akamai Technologies

Akamai Technologies

Akamai's leading security, compute, and delivery solutions are helping global companies make life better for billions of people, billions of times a day.

Oasis Technology

Oasis Technology

Oasis Technology are experts in cyber security. In addition to pioneering the game-changing TITAN anti-hacking device, we provide extensive cyber security consulting services.

Occentus Network

Occentus Network

Occentus Network is a telecommunications service provider specialized in High Availability Servers & managed Cloud services.

Digital Catapult

Digital Catapult

Digital Catapult is the UK authority on advanced digital technology. We bring out the best in business by accelerating new possibilities with advanced digital technologies.

Evolver

Evolver

Evolver delivers technology services and solutions that improve security, promote innovation, and maximize operational efficiency in support of government and commercial customers.

Proaxiom

Proaxiom

Proaxiom are focused on erasing cyber driven panic paralysis for Small and Medium Enterprises through brilliant cyber technologies which drive productivity and support growth.

Autobahn Security

Autobahn Security

Autobahn Security is a growing team of 80+ experts from 25+ nationalities, established in 5 countries. We’re working hard to make Autobahn Security the No. 1 solution for improved hacking-resilience.