FREE TO VIEW


« Back to News

2016-11-21

Welcome To A World Without Work (W3)

Automation, driverless cars and drones - a new age is dawning. Whether it is a wonderful one or a terrible one remains to be seen.

2016-11-21

NSA Chief Has A Special Phone For Top-Secret Messaging

There’s no such thing as a perfectly secure phone, especially if it also connects to the Internet.

2016-11-16

Could You Be A UK Cyber-Warrior?

A crack team of 50 'brilliant brains' is to be recruited by the UK Government to defend the country against hacking attacks.

2016-11-21

Overconfident: US Will Win A Cyber War With China

The Rand Corporation think that the US will soon have a clear advantage over China in cyber war scenarios set in the S.China sea.

2016-11-16

How Businesses Can Prevent Point-of-Sale Attacks

Retailers are victimized through the same Achilles' heel: the point-of-sale system, where customers' payment data is routinely processed.

2016-11-21

Cisco says It Will Make The IoT Safe

Cisco Systems is making a play for the fundamental process of putting IoT devices online, promising businesses greater security.

2016-11-19

Securing Data in the Cloud

Storing data in the cloud is a standard practice for today’s connected business. That does not mean they can afford to be complacent about security.

2016-11-18

Cyber-attacks & Hacking: What You Need To Know

Is the UK Government's investment of £1.9 Billion in cybersecurity defence plus a retaliatory capability really enough to address all the threats?

2016-11-15

UK Will Retaliate Against Cyberattacks

Preparing To Retaliate: Hostile "foreign actors" are developing techniques that threaten the UK's electrical grid and airports.

2016-11-10

Pepper Keep’s Son Robot Dreams on Hold

Japan's obsession with robots isn't just a cliché. Companies have been trying to drum up enthusiasm for them for years, with little success.

2016-11-11

A Career In Cyber Security Governance?

Cyber security governance jobs are growing faster than IT and there just aren't enough skilled professionals to fill the available jobs.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Zentek Digital Investigations

Zentek Digital Investigations

Zentek has been providing digital forensics services to the public and private sector for computers and mobile devices since 2004.

ASIS International

ASIS International

ASIS International is a global community of security practitioners with a role in the protection of assets - people, property, and/or information.

ISO Quality Services Ltd

ISO Quality Services Ltd

ISO Quality Services is an independent organisation that specialises in the implementation, certification and continued auditing of ISO and BS EN Management Standards including ISO 27001..

Identify Security Software

Identify Security Software

Our mission is to bring in a new age of autonomous human authentication in the security and identity space.

NetGuardians

NetGuardians

NetGuardians is a leading Fintech company recognized for its unique approach to fraud and risk assurance solutions.

Computest

Computest

Computest security testing services include Mobile app security, Vulnerability assessments, Attack & penetration testing, Security awareness training, Network security assessments.

Cybersecurity Competence Center (C3)

Cybersecurity Competence Center (C3)

The Cybersecurity Competence Center was created to further strengthen the Luxembourg economy in the field of cybersecurity.

Swarmnetics

Swarmnetics

Swarmnetics helps customers discover hard-to-find software vulnerabilities by hacking your system before the bad guys do.

Datrix

Datrix

Datrix is a leading Smart Infrastructure and Cyber Security solutions provider. We deliver critical networking, communications and cyber security solutions to public and private sector organisations.

Global Resources

Global Resources

Global Resources' planning and management capabilities support city, regional, and national utility and infrastructure management, and information systems and cyber security service delivery.

Sotero

Sotero

Sotero is the first cloud-native, zero trust data security platform that consolidates your entire security stack into one easy-to-manage environment.

GTT Communications

GTT Communications

GTT are a global network provider that serves thousands of multinational and national enterprise, government and carrier customers with a portfolio of advanced connectivity and security services.

Panoplia Digital Protection

Panoplia Digital Protection

Panoplia Digital Protection is a cutting-edge cybersecurity company that leverages the power of AI and ML to help businesses and consumers protect themselves against cyber threats.

View

View

View is the leader in smart building technologies including OT cybersecurity to securely connect buildings to the cloud and manage building networks and OT devices.

Identifid

Identifid

Identifid offers a suite of fraud prevention and identity authentication solutions to businesses and governments using the latest advances in AI, vision processing, and biometric recognition.

Neo Auth

Neo Auth

Neo Auth is an identity and access management solution to help organizations optimize their cybersecurity processes.