FREE TO VIEW


« Back to News

2020-11-02

Cyber Spying Laws Are Changing

Important legal rulings in Britain and the USA show how important it is for business to keep up with and understand national IT & data security laws.

2020-10-30

Five Things Management Must Know About Cyber Security

Cyber threats advance more quickly than many organisations can keep up with. It has never been more important for business leaders to take action.

2020-10-30

Nearly Half Of All Businesses Have No Protection

Two new pieces of research confirm the shocking levels of ignorance and complacency which leave so many business exposed to cyber attack.

2020-10-29

Amazon Sacks Employee Over Data Violation

Employees of Amazon’s Smart Doorbell product department used their account permissions to access video surveillance data of some customers.

2020-10-28

Cyber Professionals Fear Being Replaced By AI

Survey: Young cyber security professionals are happy in their jobs, but much more concerned about the impact of AI than their older colleagues.

2020-10-28

Ireland's Privacy Regulator Is Investigating Instagram

Facebook could get a huge EU fine after the Irish Data Protection Commission investigation of how Instagram handles childrens' contact data.

2020-10-28

Malware Versus Ransomware: What’s the Difference?

The decision to pay a ransom demand should not be taken lightly. If you do decide to pay, there are some things you should know. By Harman Singh

2020-10-27

Anticipating Cyber Attacks

Cyber security teams need to shift their focus inside the network and implement tools that help detect cyber attacks as early as possible.

2020-10-27

Russia's Hackers Are Masters Of Cyber Warfare

The British and US indictments of the 'Sandworm' group of military hackers reveals the extensive reach and power of professional cyber soldiers.

2020-10-27

Big Regulatory Changes In Store For The Internet

The US and the EU intend to bring in heavy regulation of tech markets which will have long term consequences for how the internet operates.

2020-10-26

The Big US Tech Corporations Are A ‘Monopoly of Power’

US Legislators are advocating massive changes that would lead to the regulatory disintegration of some of largest US tech companies.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

APMG International (APM Group)

APMG International (APM Group)

APM Group is a global accreditation, certification and examination body specializing in certification schemes for individuals, organizations and software.

Echelon

Echelon

Echelon Company is a provider of information security services specializing in certification of security software and hardware products in Russia.

Forensic Control

Forensic Control

Forensic Control specialise in providing simple & straightforward Cyber Security to organisations, helping them assess, prevent and respond to cyber threats.

4iQ

4iQ

4iQ fuses surface, social, deep and dark web sources to research and assess risks to people, infrastructure, intellectual property and reputation.

Hitachi Systems Security

Hitachi Systems Security

Hitachi Systems Security provides customized services for monitoring and protecting the most critical and sensitive IT assets in our clients’ infrastructures 24/7.

Zeneth Technology Partners

Zeneth Technology Partners

Zeneth is a consulting firm providing information technology and cybersecurity services to federal and commercial clients.

Epati Information Technologies

Epati Information Technologies

ePati Information Technologies is a specialist in information technology and cyber security.

Pentera Security

Pentera Security

Pentera (formerly Pcysys) is focused on the inside threat. Our automated penetration-testing platform mimics the hacker's attack - automating the discovery of vulnerabilities.

Cyolo

Cyolo

Cyolo’s Secure Access Service Edge (SASE) platform securely connects onsite and remote users to authorized assets, in the organizational network, cloud or IoT environments and even offline networks.

IDX

IDX

IDX is the leading consumer privacy platform built for agility in the digital age.

Blacksands

Blacksands

Blacksands is a leader in network architecture, identity & services management, threat analysis, industrial IoT architecture, and invisible dynamic networks.

PyNet Labs

PyNet Labs

PyNet Labs is a Training Company serving corporates as well as individuals across the world with ever-changing IT and technology training.

Brunswick Group

Brunswick Group

Brunswick is a critical issues firm. We advise the world’s leading companies on how to navigate the critical issues they face and engage with their critical stakeholders.

Sensity

Sensity

Sensity is a company that offers an AI-driven solution to detect and verify deepfakes and other forms of identity fraud.

AirMDR

AirMDR

Designed by experts, AirMDR solutions cater to the unique demands of security operations centers.

DataPatrol

DataPatrol

DataPatrol is a software company, specialized in providing Security and Privacy of company’s data and information in an evolved way.