FREE TO VIEW


« Back to News

2017-02-10

Yahoo Spins A Cautionary Tale Dealing With Data Privacy

Why did it take so long for the Yahoo! hack to come to light? Opinion by Emily Taylor & Joyce Hakmeh

2017-02-09

GCHQ Is Investing In Cybersecurity Start-Ups

The UK's intelligence agency GCHQ is backing a new hub for tech start-ups in a rare glimpse into its approach to cybersecurity.

2017-02-13

Hologram Technology Is Finding Military Users

Microsoft’s HoloLens hologram headset systems are already being used in the Australian, Ukrainian and Israeli armies.

2017-03-01

Suspect Monitoring & Surveillance Technology

NEC Are Looking Out For Criminal Activity: Monitoring and analysing suspicious behavior has become a pressing need for law enforcement.

2017-02-10

Blockchain’s Brilliant Approach To Cybersecurity

The Blockchain’s alternative approach to storing and sharing information provides a tool to prevent cyberattacks and to maintain security.

2017-03-03

Only In Texas: Ransomware Steals Data From Police

Ukrainian-based hackers hold a local Texas Police Force network server for ransom, resulting in the loss of video evidence.

2017-03-02

Computer Says No

An Artificial Intelligence watchdog should be set up to ensure people are not discriminated against by automated computer systems.

2017-03-02

Warning: Fake Ransomware

When confronted with what appears to be a crypto-ransomware demand many UK businesses pay up too quickly.

2017-02-24

2016 Healthcare Data Breaches

The number of US companies admitting to suffering Data Breaches went up 40% in 2016. Healthcare organisations were among the most vulnerable.

2017-02-13

Cybersecurity In 2017: Recruitment Is The Key

Help Wanted: McAfee estimates that there will be two million unfilled job positions in the cybersecurity sector within the next two years.

2017-02-24

Stop Arguing On Social Media

Once considered a world of trivia, Social Media now has a very large and growing influence in Politics, Business and Society around the world.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Centrify

Centrify

Centrify’s Next-Gen Access is an identity & access management solution that uniquely converges Identity-as-a-Service, enterprise mobility management and privileged access management.

Equilibrium Security Services

Equilibrium Security Services

Equilibrium Security Services is a specialist cyber security company providing a full spectrum of IT security solutions from consultancy to design & implementation and managed security services.

CSIRT-CY

CSIRT-CY

CSIRT-CY is the National Computer Security Incident Response Team for Cyprus.

Cycuity

Cycuity

Cycuity (formerly Tortuga Logic) is a cybersecurity company that is transforming the way we secure silicon with comprehensive hardware security assurance.

CRI4DATA

CRI4DATA

CRI4DATA's mission is to help organizations build their resilience to cyber risk.

TruNarrative

TruNarrative

TruNarrative provides a unified solution for Identity Verification, Fraud Detection, eKYC, Risk Assessment, AML Compliance and Account Monitoring.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Expel

Expel

Expel provide transparent managed security services, 24x7 detection, response and resilience.

InfoLock

InfoLock

Infolock are experts in data governance, providing consulting and advisory services that help organizations effectively secure, manage, and optimize their data.

Dynics

Dynics

The Dynics ICS-Defender is an Industrial Control System Security Appliance for OT or OT/IT convergent environments.

BlockAPT

BlockAPT

BlockAPT, empowering you with an advanced, intelligent cyber defence platform. We protect our customers digital assets by unifying operational technologies against advanced persistent threats.

Phished

Phished

Phished is an AI-driven platform that focuses on the human side of cybersecurity. By combining fully automated training software with personalised, realistic simulations of cyberattacks.

HALOCK Security Labs

HALOCK Security Labs

HALOCK is an information security consultancy providing both strategic and technical security offerings.

Primus Institute of Technology

Primus Institute of Technology

At Primus Institute of Technology our mission is to inspire, support, and empower current and aspiring IT professionals through training and career development workshops.

NeuroID

NeuroID

NeuroID combines the power of industry-leading behavioral analytics with advanced device and network intelligence to create your first line of defense against malicious bots, bad actors, and fraud.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Defence Logic

Defence Logic

Defence Logic is a cyber security company serving clients in many business sectors. Our consultancy services include Penetration Testing, Security Reviews and Monitoring.

EK3 Technologies

EK3 Technologies

EK3 Technologies mission is to provide comprehensive cybersecurity and IT solutions that allow our clients to focus on sustaining their business.