FREE TO VIEW


« Back to News

2020-11-27

A ‘FunnyDream’ From China

Some senior corporate executives have been having nightmares about being hacked on their business trips in Asia. They're not just dreaming.

2020-11-27

Cyber Security Has Become Critical For National Security

Critical national infrastructure, both public and private, is increasingly interconnected and has become susceptible to predatory cyberattacks.

2020-11-26

Donald Trump Had His Twitter Account Hacked

A Dutch cyber investigator has claimed he gained access to Donald Trump's Twitter account with the password 'MAGA2020!' Police are investigating.

2020-11-26

How The Internet Has Transformed Our Lives

Those born after 1990 may not realise the profound effects of the Internet on almost every aspect of modern life. Both good and bad.

2020-11-25

Coming Soon: Regulation Of Social Media

If the 'informational chaos' of Social Media is a threat to democracy, then might its regulation by governments be a threat to free speech?

2020-11-23

Outsourced Cyber Spying

Spying As A Service: Outsourcing an espionage campaign against your competitors to a specialist hacking group is now a practical proposition.

2020-11-21

Attack & Defence At Manchester United Football Club

One of the leading British Premiership Football clubs has suffered a sophisticated cyber attack, but they claim to have responded swiftly.

2020-11-21

Remote Working: Five Best Ways To Prevent A Data Breach

Remote teams play a critical role in the success of many companies and business leaders must be mindful of the underlying risk of data breaches.

2020-11-20

Why Real-Time Data Matters To The Maritime Industry

Maritime companies are using Big Data tools and Cloud-based sytems to drive operational efficiency. Keeping the data secure is a big issue.

2020-11-23

SANS Book: Practical Guide to Security in the AWS Cloud

SANS' Practical Guide to Security in the AWS Cloud. Tactics, techniques and procedures for securely operating in the cloud. Download Now

2020-11-19

CYRIN Cyber Alert - Test-Drive The CYRIN Cyber Range

Real Tools, Real Attacks and Real Scenarios that provides hands-on training and experience for IT Engineers and Cyber Security Defenders.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

4ARMED

4ARMED

4ARMED specializes in penetration testing, information security consultancy and security training

CW Jobs

CW Jobs

CWJobs.co.uk is a leading specialist IT recruitment website covering all areas of IT including Cyber Security.

EC-Council

EC-Council

EC-Council is a member-based organization that certifies individuals in various e-business and information security skills.

ClearDATA

ClearDATA

The ClearDATA Managed Cloud protects sensitive healthcare data using purpose-built DevOps automation, compliance and security safeguards, and healthcare expertise.

TeachPrivacy

TeachPrivacy

TeachPrivacy provides computer-based privacy and data security training that is engaging, memorable, and understandable.

NETAS

NETAS

Netas offers solutions in information and communication technologies including end-to-end value added solutions, system integration and technology services to providers and corporations.

Alpine Cyber Solutions

Alpine Cyber Solutions

Alpine Cyber is a Managed IT Service Provider focused on cybersecurity and cloud services.

eResilience

eResilience

eResilience is a division of Referentia Systems, a pioneer in an ultra-secure information safeguarding technique known as “Enclaving”, in which data can be segmented and protected within a network.

Sonrai Security

Sonrai Security

Sonrai Security delivers an enterprise security platform focused on identity and data protection inside AWS, Azure, and Google Cloud.

Cyberspace Solarium Commission (CSC)

Cyberspace Solarium Commission (CSC)

The Cyberspace Solarium Commission was established to develop a consensus on a strategic approach to defending the United States in cyberspace against cyber attacks of significant consequences.

Cyber Risk Institute (CRI)

Cyber Risk Institute (CRI)

CRI is a not-for-profit coalition of financial institutions and trade associations working to protect the global economy by enhancing cybersecurity and resiliency through standardization.

NightDragon

NightDragon

NightDragon is a venture capital firm investing in innovative growth and late stage companies within the cybersecurity, safety, security, and privacy industry.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Singularico

Singularico

Singularico help secure your software using the power of AI.

HTL Support

HTL Support

HTL Support, your trusted partner for comprehensive IT support in London. We specialize in delivering top-tier IT solutions tailored to both large enterprises and small businesses.

Security Discovery

Security Discovery

Stay ahead of cyber threats with Security Discovery. We offer expert consulting, comprehensive services, and a powerful vulnerability monitoring SaaS platform.