FREE TO VIEW


« Back to News

2017-06-14

UK SMEs Don’t Have Cybersecurity Recovery Plans

With GDPR rules coming into force in less than a year nearly half of UK small businesses don’t have a cyber security plan for their business.

2017-06-14

North Korea, WannaCry, Cyberattacks And Lazarus

Who is really to blame? For many, it seems that question has already been solved: It was North Korea. Except the evidence is not conclusive.

2017-06-13

SMEs And Cyber Insurance

Small and medium businesses rely on partners and they face a growing range of online challenges. Cyber Insurance has a key role to play.

2017-06-13

NATO Could Go To War In Response To A Cyber Attack

A persistent and devastating attack could trigger what is known as Article 5, NATO’s collective defense measure.

2017-06-12

Putin Applauds Patriotic Russian Hackers

Putin: "patriotic" citizens might be engaged in hacking. Such individuals are joining "the justified fight against those speaking ill of Russia,"

2017-06-12

French Security Chief Warns of Permanent Cyber War

France's top cyber spy says there is risk of "permanent war" in cyberspace as a result of hacking for espionage and fraud by states & criminals.

2017-06-09

UK’s Trident Nuclear Subs Vulnerability To Hackers

The Royal Navy Trident submarine fleet is vulnerable to a “catastrophic” cyber attack that could render Britain’s nuclear weapons useless.

2017-06-09

Leaked NSA Report Claims Russian 'Cyber Espionage' Against US Elections

At least one company providing software for the electoral process was targeted and 100 local election officials targeted by spear-phishing emails.

2017-06-09

Islamic State's Social Media Strategy

So called Islamic State is fighting on many fronts and puts media warfare on a par with its battle on the ground.

2017-06-12

Uber In Legal Fight With Google

Uber has fired the engineer accused of stealing secrets from Google after he failed to assist with an investigation related to the lawsuit.

2017-06-09

How To Integrate Threat Intelligence

In a complicated, fast-paced cyber environment, it's difficult to hunt for vulnerabilities. Automating threat intelligence can help you find them.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CDW

CDW

CDW is a leading multi-brand provider of information technology solutions to business, government, education and healthcare customers in the United States, the United Kingdom and Canada.

AtkinsRéalis

AtkinsRéalis

AtkinsRealis is a market-leading design, engineering and project management consultancy operating in fields ranging from infrastructure, through energy and transport to cybersecurity.

Hogan Lovells

Hogan Lovells

Hogan Lovells is an international business law firm with offices across Europe, Asia and the USA. Practice areas include Privacy & Cybersecurity.

Robert Bosch Centre for Cyber-Physical Systems (RBCCPS)

Robert Bosch Centre for Cyber-Physical Systems (RBCCPS)

RBCCPS is an interdisciplinary research and academic centre within the Indian Institute of Science focused on research in cyber-physical systems.

GuidePoint Security

GuidePoint Security

GuidePoint Security provide information security solutions that enable commercial and federal organizations to more successfully achieve their security and business goals.

iONLINE

iONLINE

iONLINE delivers high quality IT services and solutions to businesses in Azerbaijan.

Cyber Base

Cyber Base

Cyber Base is an Information Technology company based in Uganda providing software and hardware solutions to clients.

C2A Security

C2A Security

C2A Security offers a comprehensive suite of cyber security solutions for the automotive industry, providing in-vehicle end-to-end protection.

African Cyber Security

African Cyber Security

African Cyber Security and it's partners, have the expertise and skills to provide holistic solutions for companies, institutions and government.

BoldCloud

BoldCloud

BoldCloud's award winning Cybersecurity Advisory services and Layered Security approach adds new critical layers of protection for your data and your business.

Client Solution Architects (CSA)

Client Solution Architects (CSA)

Client Solution Architects (CSA) is a leading digital transformation consulting firm focused on the U.S. Defense Department and all U.S. Federal enterprise information technology service areas.

Trellix

Trellix

Trellix is an extended detection and response (XDR) solutions provider created from a merger of McAfee Enterprise and FireEye Products.

Xalient

Xalient

Xalient is an IT consulting and managed services business, specialising in modern, software-defined networking, security and communications technologies.

NorthStar

NorthStar

NorthStar provide the visibility needed to track and reduce risk through risk-based vulnerability management and vulnerability exploit prediction.

PureSquare

PureSquare

PureSquare exist to empower people with simple solutions for their increasingly complex digital security & online privacy needs.

SECTA5

SECTA5

SECTA5 is a cybersecurity company building a next-generation Continuous Threat and Exposure Management platform, leveraging the expertise of offensively trained cyber defenders.