FREE TO VIEW


« Back to News

2021-06-03

Vodafone Using Google Cloud To Retain Customers

Vodafone is working with Google on a public cloud-based CRM platform that will share their user data internationally. How secure is that?

2021-06-03

Electronic Espionage Will Use AI Instead Of Spies

The British spy agency GCHQ has produced a roadmap for how they intend to make ethical use Artificial Intelligence to replace human operatives.

2021-06-04

The FBI Can Covertly Access Your Computer

The FBI has the authority right now to access privately owned computers and to delete software without their owners’ knowledge or consent.

2021-05-17

The European Union's Digital Security Plan

A Single European Data Market: The European Union has a well-developed plan to become the leader in the next wave of digital transformation.

2021-05-14

Pipeline Hack: Biden Issues An Executive Order

This Order will change the way businesses communicate with government about cybersecurity and compels IT providers to share information.

2021-05-14

Careers In Cloud Security

Professionals see cloud security as the most important technical skill that those entering a cyber security career should possess.

2021-05-14

Automation & Industry 4.0

Industry 4.0 is a concept of creative convergence, similar to the evolutionary transition from single celled organisms to functioning organic networks.

2021-05-08

Writing An Effective Cybersecurity Policy: 5 Essential Steps

How to compile an effective operational cybersecurity policy that will make life easier in the event of a security breach. By Jessica Fender

2021-05-11

Cyber Security Shared Skills Group Created

Members will gain from actionable intelligence and tactics to improve their defensive strategies for a more resilient cyber security infrastructure.

2021-05-11

Thousands Of Stolen Identities Added To Dark Web Markets

The number of stolen digital identities available on the criminal Genesis Dark Web market has tripled with more than 18,000 being added each month.

2021-05-11

Running Out Of Cyber Gas

US business is simply not prepared to deal with advanced nation state hackers and the US government is failing to protect it. By Ronald Marks

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Fuel Recruitment

Fuel Recruitment

Fuel Recruitment is a specialist recruitment company for the IT, Telecoms, Engineering, Consulting and Marketing industries.

VMworld

VMworld

VMworld is a global conference for virtualization and cloud computing, including associated security issues.

Fredda Stanza

Fredda Stanza

Fredda Stanza specialize in Information Security and Forensics Consulting.

ABB

ABB

ABB is a pioneering technology leader in industrial digitalization. Services include cyber security for industrial control systems IoT.

CounterCraft

CounterCraft

The CounterCraft Cyber Deception Platform fits seamlessly into existing security strategies and delivers high-end deception for threat hunting and threat detection.

Quadible

Quadible

Quadible BehavAuth is an AI-platform that continuously authenticates the users, without the need of any input, by learning their behavioural patterns.

Security Weaver

Security Weaver

Security Weaver is a leading provider of governance, risk and compliance management (GRCM) software.

Synamic Technologies

Synamic Technologies

Synamic Technologies was founded in 2018 as a start-up to automate cyber security processes. Our CISOSCOPE product automates vulnerability management, risk management and compliance.

Valency Networks

Valency Networks

Valency Networks provide cutting edge results in the areas of Vulnerability Assessment and Penetration Testing services for webapps, cloud apps, mobile apps and IT networks.

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce has partnered with Purdue University and Carnegie Mellon University to create the Rolls-Royce Cybersecurity Technology Research Network.

Siren

Siren

Siren provides the leading Investigative Intelligence Platform to some of the world’s leading Law Enforcement, National Security and Cyber threat investigators.

Datapac

Datapac

Datapac is one of Ireland’s largest and most successful ICT solutions and services providers. We have been at the forefront of technology innovation in Ireland for the past three decades.

Gilsbar

Gilsbar

For more than half a century, Gilsbar has offered insurance service solutions and support for businesses and their employees.

Increase Your Skills (IYS)

Increase Your Skills (IYS)

Armed and ready: raise awareness of cyberattacks in your company with the Full-Service Awareness Platform from IYS – fast and effective. We help you develop a robust, sustainable security strategy.

Evolve Business Group

Evolve Business Group

Evolve is an independently-owned managed network solutions provider, creating bespoke packages for customers globally since 2005.

Internet Watch Foundation (IWF)

Internet Watch Foundation (IWF)

Since the early days of the internet, our job has been to help child victims of sexual abuse by hunting down and removing any online record of the abuse.