FREE TO VIEW


« Back to News

2017-06-22

AI Meets Music’s Evolution

You hum it, I'll strum it. Artificial Intelligence has the potential to transform the ways in which music is created, played and performed.

2017-06-21

Advice For Cyber Insurance Buyers

Companies interested in securing cyber insurance should know that the underwriting process requires them to do careful due diligence.

2017-06-22

Power Companies Cyber ‘Nightmare’

CrashOverride: Seven minutes before midnight last December a bomb of sorts went off in a high voltage substation north of Kiev.

2017-06-21

Cybersecurity Can Learn From Maritime Security

The Internet is similar to the oceans and seas and cybersecurity crosses boundaries similar to drug smuggling and piracy.

2017-06-23

Binky: An Anti-Social Media Simulator

Flame-wars, bad news, fake news, worse news and anxiety-fueling comment sections mean that social media is no longer the escapism it once was.

2017-07-04

RBS Bank Warns Of Increased Cybercrime

Last year, there were more than 1.8million reported cases of financial fraud, with losses of more than £768million across Britain.

2017-07-03

News & Sports Websites 'vulnerable to attack'

News and sports websites have some of the lowest levels of security. Less than 10% use basic security protocols such as HTTPS and TLS.

2017-06-30

Chinese Criminals Are Selling Your Apple Data

A criminal operation run by employees of an Apple “domestic direct sales company and outsourcing company” has been uncovered in China.

2017-06-21

Intel's Data Solutions For Military & Commercial Use

Intel has been selected by DARPA to develop a powerful new data analysis platform that will use machine learning and other AI techniques.

2017-06-23

Czechs Must Get Ready for Offensive Cyberwar

Czech security chief wants to create the necessary capacities to attack its enemy's cyber infrastructure in the case of an online attack.

2017-06-26

Getting Threat Intelligence Right

Threat intelligence is essential to alert security analysts to threats that are proliferating but have yet to infiltrate company networks.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Stratogent

Stratogent

Stratogent does IT and Cybersecurity operations. We specialize in high-touch and high-change IT environments, especially in the biotech and pharma industry verticals.

Cyber Security Network

Cyber Security Network

Cyber Security Network provide specialist cyber security recruitment services.

CFC Underwriting

CFC Underwriting

CFC is a specialist insurance provider and a pioneer in emerging risk, including cyber insurance.

Cato Networks

Cato Networks

Cato connects your branch locations, physical and cloud datacenters, and mobile users into a secure and optimized global network in the cloud.

Cipher Tooth

Cipher Tooth

CipherTooth is a superior system for delivering secure content over the Internet.

Digital Ship

Digital Ship

Digital Ship provides news, information, conferences and events focused on digital ship systems, information technology and security relating to maritime operations.

Seconize

Seconize

Seconize empowers enterprises to proactively manage their cyber risks, prioritize remediations, optimize security spending and ensure compliance.

At-Bay

At-Bay

At-Bay offer an end-to-end solution to cyber risk with comprehensive risk assessment, a tailored cyber insurance policy and year-long, active, risk-management service.

Cloud GRC

Cloud GRC

Cloud GRC is an innovative cybersecurity company with solutions and expertise in Cybersecurity Strategies & Frameworks, Threat & Risk Assessment, Cloud Security, and Regulatory Compliance Requirements

NJVC

NJVC

NJVC delivers IT automation, optimization and security to empower mission-enabling IT for customers with secure requirements.

Bedrock Systems

Bedrock Systems

BedRock Systems is on a mission to deliver a trusted computing base from edge to cloud, where safety and security isn’t just a perception, it’s a formally proven reality.

Venari Security

Venari Security

Venari is an award-winning cybersecurity SaaS provider that has developed an ETA (Encrypted Traffic Analysis) platform which fundamentally changes the way encrypted traffic is analysed.

Hubify

Hubify

Hubify is an experienced, service-driven technology company specialising in business connectivity across mobile, data, voice, cloud, & cyber security solutions.

NetCentrics

NetCentrics

NetCentrics leverages an innovative, agile, ‘what’s-next’ approach to our customers’ IT and cyber challenges.

ABPGroup

ABPGroup

ABPGroup is Asia’s leading cybersecurity technology provider focusing on providing best-of-breed solutions that address today’s pressing challenges.

MIND

MIND

MIND is the first-ever data security platform that puts data loss prevention and insider risk management programs on autopilot, so you can automatically identify, detect and prevent data leaks.