FREE TO VIEW


« Back to News

2017-05-23

Uber Faces A Criminal Probe In The US

Ride-sharing firm Uber firm is accused of using "secret" software that lets it operate in regions where its service is banned or restricted.

2017-05-22

The Difference Between Cyberspace & The Internet

The two terms are sometimes used interchangeably, although they have different meanings.

2017-05-22

Cybersecurity Has A Serious Talent Shortage

Businesses should open themselves up to applicants whose non-traditional backgrounds mean they could bring challenging new ideas.

2017-05-19

EU Nations Expand Their Cyber Defences

More EU countries are working on strengthening their national security and cyber defence infrastructure.

2017-05-19

Police Innovative Reporting Technology

A new documentation and report system brings highly customised dictation and documentation capabilities to police officers on the move

2017-05-19

Major Defence Company Adopts Blockchain

Lockheed Martin is to integrate blockchain cyber security technology into systems engineering , supply chain & software development.

2017-05-18

UK Proposes Online Surveillance In Real-Time

The "live" surveillance of British web users' internet communications is proposed in a draft technical paper prepared by the UK government.

2017-05-17

Bank Data Breaches Are Up And It's An Inside Job

Bank breaches are not always due to legacy operating systems or their inability to cope with new forms of cyber attacks. There is human error.

2017-05-16

Threat Intelligence Starter Resources

Creating a threat intelligence capability can be a challenging undertaking and not all companies are ready for it.

2017-05-16

Germany May Go Offensive After Russian Cyber Attacks

German security chief wants the legal authority to "wipe out" servers the Russian government used to deploy cyber attacks against Germany.

2017-05-16

Global C4ISR Has A Cyber Warfare Surge

C4ISR refers to Command, Control, Communications, Computers, Intelligence, Surveillance & Reconnaissance. It's a growing market.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Surrey Centre for Cyber Security (SCCS)

Surrey Centre for Cyber Security (SCCS)

The Centre focuses on three main research directions - Privacy and Data Protection, Secure Communications, and Human-Centred Security.

LRQA Nettitude

LRQA Nettitude

LRQA Nettitude is an award-winning global provider of cybersecurity services, bringing innovative thought leadership to the ever-evolving cybersecurity marketplace.

Basis Technology

Basis Technology

Basis Technology provides software solutions for text analytics, information retrieval, digital forensics, and identity resolution.

GuardKnox

GuardKnox

GuardKnox protects the users of connected vehicles against threats that can endanger their physical safety and the safety of their personal information.

Scanmeter

Scanmeter

Scanmeter helps identifying vulnerabilities in software and systems before they can be exploited by an attacker.

Worldline

Worldline

Worldline IIoT solutions allow industrial companies to start their digital transformation journey with industrial level cyber security standards (IEC 62443 ready).

OXO Cybersecurity Lab

OXO Cybersecurity Lab

OXO Cybersecurity Lab is the first dedicated cybersecurity incubator in the Central & Eastern Europe region.

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation (EIF) of Armenia is one of the largest technology business incubators and IT development agencies in the region.

Concentric

Concentric

Concentric Data Risk Monitoring and Protection. Deep Learning to discover, monitor and remediate risks to sensitive data on-premises and in the cloud.

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance provides an array of cybersecurity services including cybersecurity policy management, risk assessments and regulatory compliance consulting.

Mitiga

Mitiga

Mitiga uniquily combines the top cybersecurity minds in Incident Readiness and Response with a cloud-based platform for cloud and hybrid environments.

Trace3

Trace3

Trace3 is a pioneer in business transformation solutions, empowering organizations to keep pace with the rapid changes in IT innovations and maximize organizational health.

Diversified Search Group - Alta Associates

Diversified Search Group - Alta Associates

Diversified Search Group is an industry leader in recruiting diverse, inclusive and transformational leadership for clients.

Aquia

Aquia

Aquia are on a mission to enable innovation and drive transformative change to solve the world’s most pressing and complex cybersecurity challenges.

AI or Not

AI or Not

AI or Not - Leverage AI to combat misinformation and elevate the landscape of compliance solutions.

Ethnos Cyber

Ethnos Cyber

Ethnos Cyber is Africa’s leading cybersecurity and compliance management company. We provide Information Security, Risk Management, Cybersecurity and Compliance Management solutions to clients.