FREE TO VIEW


« Back to News

2017-02-21

Female Role Models & The Early Days Of Computing

EDSAC was one of the first computers, developed to undertake complex astronomical calculations. And one of the first users was Dr. Jilly Wheeler.

2017-02-08

Are Terrorists Winning The Digital Arms Race?

Terrorist groups are embracing a wide range of digital tools to recruit members and plan attacks. Some experts say they are winning.

2017-02-21

GoggleBox: Moderate Screen Use 'Boosts Teen Wellbeing'

A study of screen time and mental wellbeing among teenagers suggests moderate use of devices may be beneficial in a connected world.

2017-02-21

The Cyber Security Landscape: A Frightening Picture

The experts at the Institute for Critical Infrastructure Technology paint a frightening picture of the information security landscape.

2017-02-21

Indian Police Training To Crackdown On Electronic Fraud

The Indian government are allocating increased capital in training police officers to crackdown on electronic fraud involving online transactions.

2017-02-21

Nation State Hacking Has A Big Commercial Impact

What impact does the long standing practice of State sponsored hacking to steal secrets and influence elections have on the business world?

2017-02-20

Is There A Truly Secure Messaging App?

More messaging apps than ever support end-to-end encryption. Should they prioritize convenience or security?

2017-02-20

Udacity Offer Deep IT Learning Programs & Nano-Degrees

Startup Udacity is using innovative methods of promoting large scale vocational IT education with focused foundation programs & 'nano degrees'.

2017-02-18

Italian Brother & Sister Cyber Spies Arrested

Two Italians stand accused of having spied on Italian politicians, state institutions, law enforcement agencies, businesses & the Vatican.

2017-02-08

Auditors Need To Know About Cyber Security

Information Security: Auditors have an obligation to educate themselves about cyber security technology if they are to do their job properly.

2017-02-18

Action Fraud: Social Media Used to Steal Charity Donations

An emerging fraud where social media platforms are used to attract donations to overseas welfare charities that do not exist.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Axiad IDS

Axiad IDS

Axiad IDS is a Trusted Identity solutions provider for enterprise, government and financial organizations.

ThreatAdvice

ThreatAdvice

ThreatAdvice is a provider of cybersecurity education, awareness and threat intelligence.

Quokka

Quokka

Quokka (formerly Kryptowire) is the source for mobile security and privacy solutions, staying steps ahead of the threat and delivering peace of mind.

Cyberens

Cyberens

Cyberens provide cybersecurity consulting services in IT sectors relating to defense and space, banking, industrial control systems and IoT.

Valire Software

Valire Software

Valire provide a solution for the automated detection of internal fraud.

Absolute IT Asset Disposals

Absolute IT Asset Disposals

Absolute IT Asset Disposals is an IT asset disposal (ITAD) company providing safe and secure recycling of IT assets.

u-blox

u-blox

u-blox deliver leading wireless technology to reliably and securely locate and connect people and devices.

Polaris Infosec

Polaris Infosec

Polaris Web Presence Protection (WPP) is powered by our proprietary artificial intelligence and machine learning engine to ensure that attacks are stopped before they affect your business.

Switchfast Technologies

Switchfast Technologies

Switchfast Technologies is an IT consulting and managed services provider, offering IT support and consulting to Chicagoland small businesses.

BugDazz

BugDazz

BugDazz pentest as a service (PTaaS) platform helps bringing in real-time results, detail coverage, & easy remediation workflows with compliance-ready reports.

Ermetic

Ermetic

Ermetic’s identity-first cloud infrastructure security platform provides holistic, multi-cloud protection in an easy-to-deploy SaaS solution.

LogicGate

LogicGate

The LogicGate Risk Cloud™ is an agile GRC cloud solution that combines powerful functionality with intuitive design to enhance enterprise GRC programs.

Brightsolid

Brightsolid

Brightsolid are experts in Hybrid Cloud. We design, build and manage secure, scalable cloud environments that meet customers’ business ambitions.

Buguard

Buguard

Buguard is a multi-award-winning supplier of Application Security Assessments and GRC services.

Getvisibility

Getvisibility

Getvisibility enables customers to detect, classify and protect sensitive information increasing data security, governance, compliance and lowering the risk of losing valuable data.

SFY Information Technology

SFY Information Technology

SFY helps companies with Cyber Security and Managed IT, allowing them to focus on what really matters to them.