FREE TO VIEW


« Back to News

2017-01-16

America’s Cyber Security Dilemma

Unintended Consequence: Is US military spending driving adversaries towards cheaper, cyber-focused means of response?

2017-01-16

German Police Will Squash Fake Online News

Pure Fiction: Combining exaggerated and unconnected incidents to create a picture of chaos and of foreigners promoting terrorism.

2017-01-16

Five Cybersecurity Predictions for 2017

The enterprise security Ninjas at Tanium list their top five predictions for cybersecurity in the year ahead.

2017-01-16

Police Connectivity: In-Car Video & Body Cameras

The ability of police systems to communicate with each other can result in better operational performance.

2017-01-13

AI and VR Are About To Transform Business

Artificial Intelligence & Virtual Reality are synonymous with gaming but they are going to change the way you communicate and do business.

2017-01-13

ISIS Just Can’t Resist Social Media

Social media is a key tool used by Jihadis to recruit followers, spread their radical interpretations of Islam and to promote outrage.

2017-01-13

Vladimir Putin & Donald Trump: Relationship Counselling

President-elect Trump is not yet in office and the allegations that President Putin interfered with the election in his favour are not going away.

2017-01-11

How AI Will Solve The Skills Shortage

Just as the Internet has revolutionised IT in the last 25 years, the current trajectory places AI squarely at the next technology inflection point.

2017-01-11

Russia Waging Cyberwar On Ukraine

Silent War: The Ukrainian President says Russian security services are waging a cyberwar against his country.

2017-01-11

Seamless Bio Electronic Devices

Bio Electronics: Harnessing biological rules to exchange information between the biochemistry of our bodies and the chemistry of our devices.

2017-01-11

The Digital Transformation Of The Humanitarian Sector

No industry is immune to being disrupted by technology. And that includes conflict and humanitarian relief. Opinion by Anje Kaspersen

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

SecureAuth

SecureAuth

SecureAuth delivers cutting edge identity and information security solutions for cloud, mobile, web, and VPN systems.

Blue Ridge Networks

Blue Ridge Networks

Blue Ridge offers a suite of solutions that enable secure remote access to the enterprise network with protection and control of endpoints.

VerifyMe

VerifyMe

VerifyMe is a global technology solutions company delivering brand protection offerings to mitigate counterfeiting, product diversion, and illicit trade.

e2e-assure

e2e-assure

e2e Protective Monitoring and Security Operations Centre (SOC) Service is a complete cyber defence service to protect your critical assets from cyber attacks and GDPR breaches.

Swiss Accreditation Service (SAS)

Swiss Accreditation Service (SAS)

SAS is the national accreditation body for Switzerland. The directory of members provides details of organisations offering certification services for ISO 27001.

Intercast Global

Intercast Global

Intercast's mission is to be a strategic resource to our clients in Risk Reduction. We are a global leader in cyber security staffing and consulting to the enterprise.

Get Indemnity

Get Indemnity

Get Indemnity are specialist insurance brokers with experience working on a wide range of innovative business insurance products that combine risk management, indemnity and incident response services.

Measured Insurance

Measured Insurance

Measured Insurance are bridging the gap between technology and Insurance using AI-Powered analytics that track clients’ exposure in real time to create smarter insurance products.

Ackcent Cybersecurity

Ackcent Cybersecurity

Ackcent's mission is to help our clients to protect their critical digital assets by providing them with a portfolio of specialised professional services.

LOGbinder

LOGbinder

LOGbinder eliminates blind spots in security intelligence for endpoints and applications.

AaDya

AaDya

AaDya provide smart, simple, affordable and effective cybersecurity software solutions for small and medium businesses.

Cyturus Technologies

Cyturus Technologies

Cyturus Technologies delivers cybersecurity business risk quantification services using our proprietary Adaptive Risk Model (ARM).

Computacenter

Computacenter

Computacenter is a leading independent technology partner, trusted by large corporate and public sector organisations. We help our customers to source, transform and manage their IT infrastructure.

CyberFOX

CyberFOX

CyberFOX is a global cybersecurity solutions provider focused on identity access management (IAM) for managed service providers (MSPs) and IT professionals.

rThreat

rThreat

rThreat is a cloud-based SaaS solution that challenges your cyber defenses using real-world and custom threats in a secure environment, ensuring your readiness for attacks.

Cyber Guru

Cyber Guru

Cyber Guru is an effective cybersecurity awareness training platform, enabling organisations to increase their resistance to cyber-attacks by changing employee behaviour.