FREE TO VIEW


« Back to News

2017-05-03

Google Acts Against Fake News

Google announces its first attempt to combat the circulation of “fake news” on its search engine using new tools.

2017-05-02

Cybersecurity Trends For Boards & Directors

Directors find themselves in unfamiliar territory when it comes to formulating policies & oversight processes that address cybersecurity risk.

2017-05-02

Technology Can Not Diminish Insider Threats By Itself

The key to reducing insider threats lies in understanding the individual’s mindset and having robust monitoring on that person's systems & data.

2017-05-02

Ten Myths About Cybercrime

Don't let cybersecurity fantasy stop you from building the effective countermeasures you need to protect your organisation from attack.

2017-05-02

Snowden Can Stay In Russia For As Long As He Likes

The former NSA contractor has been living in Russia since 2013, after leaking thousands of classified intelligence documents and fleeing the US.

2017-05-02

EU / US Privacy Shield Affects Your Organisation

Although we live in a world where data transfer is easier from a technical standpoint, location is increasingly important from a legal perspective.

2017-05-01

Teenagers And Cybercrime

More teenagers are getting involved in cybercrime. Many do it for fun without realising the consequences, but the penalties can be severe.

2017-05-01

Get Ready: Robots Will Destroy Jobs

Robotics promises to be the most profoundly disruptive technological shift since the industrial revolution.

2017-04-28

Over 60% Of UK Businesses Lack Any Real Cyber Security

Cyber Security Breaches Survey 2017: Virtually all UK businesses surveyed are exposed to some kind of cybersecurity risk.

2017-04-28

US Intelligence Agencies Fear Insiders As Much As Spies

Forget about spies. It's rogue insiders that cause heartburn at US intelligence agencies these days.

2017-04-27

Fake Police Ransomware Scam

Cyber criminals used JavaScript to trick Apple Safari web users into believing that their devices were compromised by police ransomware.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DataCore Software

DataCore Software

DataCore Software is a leader in Software-Defined Storage. Solutions offered include back up and disaster recovery.

AML Solutions

AML Solutions

AML Solutions offer a full range of Anti-Money Laundering and Countering the Financing of Terrorism (AML/CFT) services.

Cast Software

Cast Software

CAST is a pioneer in Software Analysis and Measurement (SAM) to capture and quantify the reliability and security of business applications.

Second Nature Security (2NS)

Second Nature Security (2NS)

2NS provide vulnerability assessment, penetration testing, security audit, application and network security and secure software development processes.

European Business Reliance Centre (EBRC)

European Business Reliance Centre (EBRC)

EBRC is a leader in integrated Data Center, Cloud and Managed Services and a Centre of Excellence in Europe in the Management of Sensitive Information.

Certego

Certego

Certego is a company of the VEM Sistemi Group specialised in providing managed computer security services and to combat Cyber Crime.

Stratus Cyber

Stratus Cyber

Stratus Cyber is a premier Cyber Security company specializing in Managed Security Services. Our services include Blockchain Security, Pentesting, and Compliance Assessments.

FraudWatch International

FraudWatch International

FraudWatch has been protecting client brands around the world since 2003, and are the leaders in online brand protection from phishing, malware, social media and mobile apps impersonation.

FireCompass

FireCompass

FireCompass SAAS platform helps CISOs & Security Teams in continuous risk assessment by mapping your attack surface and knowing the “unknown unknowns”.

Corsica Technologies

Corsica Technologies

Corsica Technologies is recognized as one of the top managed IT and cybersecurity service providers. Our integrated IT and cybersecurity services protect companies and enable them to succeed.

AMSYS Innovative Solutions

AMSYS Innovative Solutions

AMSYS is a full-service, 24/7/365 IT solutions, Cybersecurity & Managed Service Provider.

Clarabot Nano

Clarabot Nano

Nano is the secure file sharing tool to improve content search, data access and collaboration between multiple parties.

Tech Seven Partners

Tech Seven Partners

At TechSeven Partners, we provide a full suite of cyber security solutions for your business including network monitoring, onsite and cloud backup solutions, HIPAA or PCI compliance.

Otto

Otto

Stop Client-Side Attacks. Plug otto into your application security suite and protect your supply chain.

Alethea

Alethea

Alethea is a technology company helping companies, nonprofits, and democracies protect themselves from harms stemming from disinformation and social media manipulation.

ASPIA InfoTech

ASPIA InfoTech

ASPIA Infotech is a leading Information and cybersecurity organization focused on innovative approaches to avert targeted attacks.