FREE TO VIEW


« Back to News

2017-07-04

Cyberwar: A New Front For US Military

Cyber warfare is a game changer in how to assess enemies, meet their challenges and enact policies that match the growth of the cyber domain.

2017-07-03

Latest: All About Petya

The current Petya infestation spreads as rapidly and indiscriminately as WannaCry did, but it's better crafted and more dangerous.

2017-07-04

VR Systems Will Change US Navy Training

Virtual Reality and light detection technologies are about to change the way the US Navy prepares for war.

2017-07-03

Three Ways To Prepare Your Business For GDPR

The UK will apply the EU General Data Protection Regulation which comes into force next year on May 25th 2018. Get ready.

2017-07-03

Hacking A Chip With A Wave of Your Hand

Electro-magnetic fault injection hacking works and soon it will become important to protect electronic device components from non-invasive hacks.

2017-07-03

Ten Years Since The Outbreak Web War One

Estonia was the first victim of cyberwar and a decade later we are still grappling with the new era of increasingly sophisticated digital weapons.

2017-07-03

App Or Browser: Which Is Safer For Online Banking?

If you need to make a transaction on the go banking apps ought to be more secure than browsers, but it isn’t necessarily so.

2017-07-03

Urgent: Investment In NHS Cybersecurity

The Health Service in Scotland needs urgent investment to update legacy systems & preparedness.

2017-06-30

Petya Cyber Attack Update

“Petya” ransomware has caused serious disruption at large firms and paying the ransom does not work. Take defensive action.

2017-06-30

How A Nation Became Russia's Cyberwar Experiment

Blackout: In Ukraine, the quintessential cyberwar scenario has come to life.

2017-06-30

WannaCry Returns To Attack Honda

Lingering Effects: Car giant Honda's manufacturing operations suffer a temporary shut down weeks after the initial attack wave.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Positive Technologies

Positive Technologies

Positive Technologies is a leading global provider of enterprise security solutions for vulnerability and compliance management, incident and threat analysis, and application protection.

Paygilant

Paygilant

Paygilant’s disruptive technology is designed to protect mobile payment  financial transactions against fraudulent attacks, whether executed by NFC, QR code, P2P or in-app.

Subgraph

Subgraph

Subgraph is an open source security company, committed to making secure and usable open source computing available to everyone.

Aveshka

Aveshka

Aveshka is a professional services firm focused on addressing complex threats and challenges including Cybersecurity and Information Technology.

DataArt

DataArt

DataArt is a global technology consultancy that designs, develops and supports unique software solutions. Areas of activity include software security testing.

Level Effect

Level Effect

Level Effect is developing new capabilities to bring a unique perspective on proactive network defense and advanced security analytics.

DataDome

DataDome

DataDome offers real-time AI protection against all OWASP automated threats, including credential stuffing, layer 7 DDoS attacks, SQL injection & intensive scraping.

M12

M12

M12 (formerly Microsoft Ventures) is the corporate venture capital subsidiary of Microsoft.

Option3

Option3

Option3 (formerly Option3Ventures - O3V) primarily seek control investments in the growing cybersecurity mid-market, seeking to build champions with the scale to bring cutting-edge products to market.

SystemExperts

SystemExperts

SystemExperts is a premier provider of IT compliance and cyber security consulting services.

TAG Cyber

TAG Cyber

TAG Cyber's mission is to provide world-class cyber security research, advisory, and consulting services to enterprise security teams around the world.

Ethyca

Ethyca

Ethyca builds automated data privacy infrastructure and tools for developers and privacy teams to easily build products that comply with GDPR, CCPA Privacy Regulations.

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

AWS Marketplace eBook: Optimizing your cloud deployments to accelerate cloud activities, reduce costs, and improve customer experience.

Ampere Industrial Security

Ampere Industrial Security

Ampere is an industrial security firm. We specialize in industrial control systems (ICS) and operational technology (OT) security.

Digital Silence

Digital Silence

Digital Silence is a world-class provider of information security research and consulting services.

AVANT Communications

AVANT Communications

AVANT is a premier distributor of next generation technologies with the resources and relationships needed to successfully navigate the ever-changing world of communications and IT infrastructure.