FREE TO VIEW


« Back to News

2017-05-09

Artificial Intelligence Is A Fascist's Dream

As AI becomes more powerful, people need to make sure it’s not used by authoritarian regimes to centralise power & target certain populations.

2017-05-09

Big Data Tech Alters Homeland Security

The market for Big Data & Data Analytics products for use in Homeland Security is growing fast and will be worth $11 Billion by 2022.

2017-05-03

Cyber Warfare - Alleged Failures Of North Korean Missile Launches

Is it possible that some malware could sit in a North Korean missile system that only becomes active when it is launched in the direction of Japan?

2017-05-10

Terrorism Prevention & Border Protection – New Face Recognition Platform

Using unique feature recognition capabilities, FaceFirst's new airport security platform identifies visitors in high traffic areas.

2017-05-08

Police Take To The Air With Connectivity

Highly secure internet connectivity lets US Police tactical flight officers connect to communications systems and databases while airborne.

2017-05-05

You Should Read LinkedIn's New Privacy Policy Carefully

The Small Print: Are you are sharing information that might violate your employer’s default confidentiality agreement?

2017-05-08

How A Cyber Attack Transformed Estonia

Cyber Attacks. Information Warfare. Fake News: Estonia was among the first countries to come under attack from modern hybrid warfare.

2017-05-03

Hacker Holds Netflix To Ransom

A hacker claims to have stolen the upcoming season of Netflix’s hit series 'Orange is the New Black' and is demanding a ransom payment.

2017-05-05

US vs. North Korea Cyberwar Underway

It seems highly likely that an innovative and highly secretive cyber war is underway with implications for critical infrastructure.

2017-05-03

Cyber Should Be Standalone Insurance

Treating cyber risk as a standalone insurance risk promises to unlock the potential for meaningful coverage for both insurers & buyers.

2017-05-03

Intelligence Agency Backs Start-Up Spy Apps

The US Defense Intelligence Agency has a new approach to acquisition and software development that looks a lot like Silicon Valley's.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Leonardo

Leonardo

Leonardo (formerly Finmeccanica) is a global high-tech company in Aerospace, Defence, Security & Information Systems including Cybersecurity & ICT solutions.

iStorage

iStorage

iStorage is the leading global provider of PIN Activated, hardware encrypted, portable data storage solutions.

European Council on Foreign Relations (ECFR)

European Council on Foreign Relations (ECFR)

ECFR is a pan-European think-tank conducting research and promote informed debate on European foreign policy. Cyber security is becoming an intrinsic element of foreign policy debate.

Logz.io

Logz.io

Logz.io is an AI-powered log analysis platform that offers the open source ELK Stack as a enterprise-grade cloud service with machine learning technology.

Remediant

Remediant

Remediant is the leader in Precision Privileged Access Management. We protect organizations from ransomware and data theft via stolen credentials and lateral movement.

Secude

Secude

SECUDE is an established global security solutions provider offering innovative data protection for SAP users.

ShiftLeft

ShiftLeft

ShiftLeft is a continuous application security platform, purpose-built for the modern software development life cycle.

Vehere

Vehere

Vehere specialises in mission critical signals aquisition and analytics platform and cyber defence systems.

Omnipotech

Omnipotech

Omnipotech is a complete managed service provider. From desktop to datacenter, all the technology support you need, under one umbrella.

InfoSec Conferences

InfoSec Conferences

InfoSec Conferences is an online directory of infosec conferences. We list every single Information Security conference, event and seminar within every niche in Cybersecurity.

TransUnion

TransUnion

TransUnion is a global information and insights company that makes it possible for businesses and consumers to transact with confidence.

Eunetic

Eunetic

Eunetic IT security solutions - we secure your websites, emails, domains and data.

BlueCat Networks

BlueCat Networks

BlueCat is the Adaptive DNS company. Our mission is to help the world’s largest organizations thrive on network complexity, from the edge to the core.

Blue Bastion

Blue Bastion

Don’t give cybercriminals the chance to find weaknesses in your company’s cyber security system. Defend your institution from all attacks from all directions with Blue Bastion.

Vigilant Ops

Vigilant Ops

Vigilant Ops is a leader in Software Bill of Materials (SBOM) Automation. A proactive approach to cybersecurity with continuous vulnerability monitoring.

BioID

BioID

BioID are a German company offering deepfake detection, liveness detection, facial authentication & identity verification as a Service.