FREE TO VIEW


« Back to News

2017-06-13

How Cybercrime Affects The Healthcare Industry

Stolen medical records can be used for different types of identity fraud and phishing attack. The threat from these can persist for many years.

2017-06-15

Cambodia’s Cyber War Room

The concept of Fake News is really catching on and seems to be taking an important role in politics in Cambodia.

2017-06-14

What Makes A Cyber Criminal?

The UK’s National Crime Agency has published research on why some young people become involved in cybercrime. Its not about the money.

2017-06-05

How Social Media Influences Elections

With Facebook now a key electoral battleground, researchers are studying how automated accounts are used to alter political debate online.

2017-06-16

Guidance For Connected Vehicle Security

The Future Of Motoring: New forms of connectivity and relationships to cloud-based services, smart homes, even smart cites.

2017-06-08

Employees That Cause Data Breaches

When it comes to cybercrime, more and more companies are realising that trusted and trained employees pose an enormous threat.

2017-06-07

Small Businesses Should Consider Cyber Insurance

A shockingly low number of small businesses invest in cyber liability insurance to combat the potentially devastating effects of a cyber attack.

2017-06-14

How Cybersecurity Benefits from Hackers

Despite the crimes committed and the damage they do, there are some ways cybersecurity can benefit from the existence of hackers.

2017-06-06

Russian Cyber Gang Arrested By …. Russia

Russian Interior Ministry arrests major cyber criminal gang that infected over 1m Android smartphones with the CronBot Trojan.

2017-06-07

Workers' Rights v. Robot Jobs

Disruption: AI will have a major impact on numerous types of paid employment as computers that can learn on the job reshape the job market.

2017-06-07

Disney Says Film Hack Threat Was A Hoax

Media production companies are switching to digital production & distribution technologies, making them vulnerable to hackers and extortion.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MobileIron

MobileIron

MobileIron provides EMM capabilities to IT organizations that need to secure mobile devices, applications and content.

AON

AON

Aon is a leading global provider of risk management (including cyber), insurance and reinsurance brokerage, human resources solutions and outsourcing services.

Intland Software

Intland Software

Intland offer an integrated Application Lifecycle Management platform that offers all-round Requirements, Development, and Testing & Quality Assurance functionality.

Malta Information Technology Agency (MITA)

Malta Information Technology Agency (MITA)

MITA is the central driver of Government Information and Communications Technology (ICT) policy, programmes and initiatives in Malta.

Telesoft Technologies

Telesoft Technologies

Telesoft Technologies is a global provider of cyber security, telecom and government infrastructure products and services.

IBA Security

IBA Security

IBA Security is a center of competence consolidating the cybersecurity expertise of the IBA Group.

InnoValor

InnoValor

InnoValor realises value from digital innovation for organisations and government. We provide advisory services and develop innovative software solutions, based on our background in research.

Newtech Recycyling

Newtech Recycyling

Newtech Recycyling specializes in the removal and disposal of IT infrastructure which has reached the end of its life cycle.

RIT Global Cybersecurity Institute

RIT Global Cybersecurity Institute

At RIT's Global Cybersecurity Institute, we educate and train cybersecurity professionals; develop new cybersecurity and AI-based knowledge for industry, academia, and government.

senhasegura

senhasegura

senhasegura is a global Privileged Access Management vendor. Our mission is to eliminate privilege abuse in organizations around the globe and build digital sovereignty.

Hackurity.io

Hackurity.io

Hackurity.io is a high energy IT security start-up founded in 2021 out of the frustration that IT Security is highly fragmented and reactive.

Modern Networks

Modern Networks

Modern Networks is a leading provider of IT managed services to the UK’s commercial property sector and medium sized enterprises.

Protos Labs

Protos Labs

Protos Labs enables insurers & enterprises to make better cyber risk decisions through holistic, real-time risk management tools.

BioID

BioID

BioID are a German company offering deepfake detection, liveness detection, facial authentication & identity verification as a Service. 

Backblaze

Backblaze

The Backblaze Storage Cloud provides a foundation for businesses, developers, IT professionals, and individuals to build applications, host content, manage media, back up and archive data, and more.

rThreat

rThreat

rThreat is a cloud-based SaaS solution that challenges your cyber defenses using real-world and custom threats in a secure environment, ensuring your readiness for attacks.