News

2016-03-23

Is Apple Right To Resist The FBI?

The FBI wants Apple to do something no private company has ever been forced to do: break its own technology.

2016-03-23

China Wants FBI’s Help With Internet Security

China wants to have deeper Internet security, anti-terrorism and corruption cooperation with the United States.

2016-03-23

U-Upload : Knowledge Straight To Your Brain

Researchers from HRL Laboratories say they have found a way to manipulate the brain to greatly amplify learning.

2016-03-23

The Future Of Big Data – Some Predictions

Almost everyone can agree that big data has taken the business world by storm, but what’s next?

2016-03-22

AI Is Closer Than We Know…

Recent advances in technology make AI even closer to reality than most of us imagine.

2016-03-21

The Vocabularist: How We Use The Word ‘Cyber’

The prefix "cyber-" now denotes words to do with the Internet, although it has followed an eventful path to reach its modern meaning.

2016-03-21

Google's AI Wins Final Go Challenge

Google's DeepMind artificial intelligence has secured its fourth win over a master player, in the final of a five-match challenge.

2016-03-23

Ukraine Blackout – The Future Of War

To see how cyber will play into armed conflict, look no further than the attacks on the Ukrainian energy sector.

2016-03-21

Now Surveillance 'aggressive-invasive': Snowden

Edward Snowden, known for revealing the extent of surveillance by US intelligence, says it is "more aggressive and invasive today than it was before".

2016-06-24

'Brexit' Could Put Data Sharing in Jeopardy

A vote to leave and the passing of the IP Bill could see a ban on the transfer of data between the UK and EU. Opinion by Emily Taylor

2016-03-14

Directors & Senior Management Cyber Report (£)

Business need more electronic security, thoughtful analysis and consideration given to potential commercial risk & opportunities than ever.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Certification Europe

Certification Europe

Certification Europe (now Amtivo Ireland) is an accredited certification body which provides ISO management system certification, including ISO 27001.

Authorize.Net

Authorize.Net

Authorize.Net is a Payment Gateway which provides the complex infrastructure and security necessary to ensure fast, reliable and secure transactions.

Ivanti

Ivanti

Ivanti provide user-centered IT solutions designed to increase user productivity while reducing IT security risk.

Cyversity

Cyversity

Cyversity's mission (formerly ICMCP) is the consistent representation of women and underrepresented minorities in the cybersecurity industry.

VXRL

VXRL

VXRL is a Hong Kong-based cybersecurity company. We provide consulting services, penetration testing, and corporate training.

Assertion

Assertion

Assertion secures your collaboration (UC/CC) systems from cyber risks. Enforcing the right set of controls and monitoring them continually brings down risk to acceptable levels.

Trusted Objects

Trusted Objects

Trusted Object's mission is to provide state of the art security solutions and services enabling a strong root of trust for the IoT ecosystem.

Blockchain R&D Hub

Blockchain R&D Hub

Blockchain R&D Hub's mission is to serve the needs of blockchain ecosystem as the center of excellence for technology research and development.

SecureStrux

SecureStrux

SecureStrux are a cybersecurity consulting firm providing specialized services in the areas of compliance, vulnerability assessment, computer network defense, and cybersecurity strategies.

Edgile

Edgile

Edgile is the trusted cyber risk and regulatory compliance partner to the world’s leading organizations, providing consulting, managed services, and harmonized regulatory content.

Digital Pathways

Digital Pathways

Digital Pathways is an award-winning data security provider that helps businesses protect their digital assets.

N-able

N-able

N-Able deliver simple and sophisticated monitoring, security, and business solutions that empower you to solve your toughest IT challenges.

ShellBoxes

ShellBoxes

ShellBoxes are a leading Web3 company focused on providing top-notch blockchain security and development services.

Unit 42

Unit 42

Unit 42 brings together world-renowned threat researchers, incident responders and security consultants to create an intelligence-driven, response-ready organization.

Summit 7 (S7)

Summit 7 (S7)

Summit 7 is a national leader in cybersecurity, compliance, and managed services for the Aerospace and Defense industry and corporate enterprises.

AKIPS

AKIPS

AKIPS develops the world's most scalable network and infrastructure monitoring software, delivered as a turn-key software appliance.