News

2016-04-20

The Spies Of tomorrow Love Data…

Working in an age where everything is recorded and leaves a digital footprint requires different tradecraft.

2016-04-19

Deep Learning Blows Up Your Data Strategy

The implications for how you manage data are radical. Here is what you need to think about.

2016-04-17

US Cyberwar Against ISIS Begins

US Defence Secretary, Ashton Carter has issued orders to the US Cyber Command to launch online attacks against the terrorist group.

2016-04-19

Anonymous’ ‘Hack Israel Day’ Could Impact The Entire World

The operation, which generally consists of DDoS attacks, website defacement and attempts at data theft, has had some positive effects.

2016-04-11

CyberScape – The Growing Influence of Cyber (£)

Cyber issues have entered most of the areas of any organisation’s systems and often, routine working methods and communications.

2016-04-11

The Future Of Cash (£)

Cambridge University’s Cambridge Security Initiative has recently completed a report entitled Cash is King and its outline findings are laid out here.

2016-04-11

Cognitive Computing is Advancing (£)

Cognitive computing will affect all businesses in different ways even if most people at present are often unaware of its potential.

2016-04-12

Chinese Military Aim To Lead On Cyber-Space Defense

The Chinese military is forming a new Strategic Force to enhance its cyber warfare, space security & online espionage capabilities.

2016-04-11

Computer Blind Spots (£)

The majority of businesses have a number of areas of their organisation which are not analysed properly and reviewed for potential cyber breach.

2016-04-12

Ukraine - More Cyber Attacks

Consultant working for government claims energy companies ignored their own security rules in power grid hack, as more attacks are predicted to come.

2016-04-11

What Should You Do If Your Business Is Hacked? (£)

Unfortunately hacking is now part of the current culture and around 85% of businesses worldwide have been hacked in one form or many.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IX Associates

IX Associates

IX Associates is a UK based IT Integration business specialising in risk, compliance, eDefence, and network security solutions.

Hyve

Hyve

Hyve provide a wide range of managed web hosting services including private, hybrid and public VMware cloud hosting.

DataLocker

DataLocker

DataLocker offers both hardware based external storage and software based cloud storage encryption solutions.

aeCERT

aeCERT

aeCERT is the national Computer Emergency Response Team for the United Arab Emirates.

Data Security Council of India (DSCI)

Data Security Council of India (DSCI)

DSCI is a premier industry body on cyber security and data protection in India, committed to making the cyberspace safe, secure and trusted.

Graphus

Graphus

Graphus provides a simple, powerful, automated solution that eliminates 99% of social engineering and spear phishing attacks against G Suite business Gmail users.

Bowbridge

Bowbridge

Bowbridge provides anti-virus and application security solutions for SAP systems.

Red Sift

Red Sift

Red Sift is the only integrated cloud email and brand protection platform, supporting organizations to secure their communications.

Fortanix

Fortanix

Fortanix Runtime Encryption keeps keys, data, and applications completely protected from external and internal threats.

AlertSec

AlertSec

AlertSec Ensure is a U.S. patented technology that allows you to educate, verify and enforce encryption compliance of third-party devices.

BitNinja

BitNinja

BitNinja provides full-stack server security in one easy-to-use protection suite. Enjoy real-time protection, automatic false positive handling and threat analysis for more in-depth insights.

cleverDome

cleverDome

cleverDome has created the first community built and proven model that redefines the standards for protecting the most confidential data and information of consumers in the cloud.

DAtAnchor

DAtAnchor

Anchor is simply a better way to protect and control sensitive data. Zero-trust, data-centric security. Simplified.

Intrepid Solutions and Services

Intrepid Solutions and Services

Intrepid Solutions and Services provides technology solutions and professional services to key components of the intelligence and national security communities.

E2E Technologies

E2E Technologies

E2E Technologies are a proactive, SLA-beating, managed service provider that busts the common stereotypes surrounding IT.

Secora Consulting

Secora Consulting

Secora Consulting is a professional services company specialising in tailored cybersecurity assessments and cyber advisory services.