FREE TO VIEW


« Back to News

2016-10-18

The New US President Must Win the Cyber War On Terror

America’s Cold War has become a Code War and whoever is the next US president must commit to winning the growing cyber war.

2016-10-18

The Science of Threat Intelligence

Threat intelligence is a new technique that helps security organisations recognise attack indicators and target their response fast & accurately.

2016-10-17

Indian Police In A Cyberwar

Indian Government websites are like low-hanging fruits, easy to targets for hackers due to their lack of security.

2016-10-17

Hillary Clinton Says WikiLeaks Is 'Russian Propaganda'

Clinton fires back as Wikileaks release more hacked emails, calling the website a “propaganda arm of the Russian government”. What's going on?

2016-10-17

US Security Bureau Finally Reacts To Snowden

The empty stable door is firmly bolted shut with the creation of a new US agency to protect federal data & screen out unsuitable employees.

2016-10-17

NATO’s Cyber-Capabilities Are Only Defensive

NATO's ability to respond offensively to Cyber-attacks is hindered by its previous inaction and inherent difficulties surrounding Cyber defense.

2016-10-14

US And Russia Face Off Over Syria & Cyber Attacks

Relations between the US and Russia are taking a nosedive. Will the their global cyber conflict escalate?

2016-10-14

Cyber Threats To Israel’s Air Traffic Control

Cyber-attacks on Israeli infrastructure are constant and may now include air traffic control installations.

2016-10-14

Global Cyber Security Awareness Month

Cyber security is, by its very nature, a borderless pursuit and more nations should be getting involved.

2016-10-13

Hacking The Vote: Russia Wins, America Loses

Russia has finally issued a response to the allegations of hacking American government servers and it proved to be a very unsubtle one.

2016-10-12

What Does Brexit Mean For British Data Privacy?

The UK’s data protection watchdog has three years to convince the government to adopt and enact the EU laws it is set to break away from.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Information Commissioner's Office (ICO)

Information Commissioner's Office (ICO)

The Information Commissioner's Office is an independent authority set up to uphold information rights in the public interest.

Hack in the Box Security Conference (HitBSecConf)

Hack in the Box Security Conference (HitBSecConf)

HITBSecConf is a platform for the discussion and dissemination of next generation computer security issues. Our events feature two days of training and a two-day multi-track conference

DataProtect

DataProtect

DataProtect is a specialized information security company providing consultancy, information management, integration and training services.

SynerLeap

SynerLeap

SynerLeap is ABB's innovation growth hub. Our aim is to help startups accelerate and expand across industries, ranging from industrial automation and robotics to grid technologies and smart cities.

FraudWatch International

FraudWatch International

FraudWatch has been protecting client brands around the world since 2003, and are the leaders in online brand protection from phishing, malware, social media and mobile apps impersonation.

IP Twins

IP Twins

IP Twins offer a wide range of services related to domain names and online brand protection.

Expel

Expel

Expel provide transparent managed security services, 24x7 detection, response and resilience.

Adarma Security

Adarma Security

Adarma are specialists in threat management including SOC design, build & operation.

FirstWave Cloud Technology

FirstWave Cloud Technology

FirstWave Cloud Technology is a global cyber security company which has been delivering Cybersecurity-as-a-service solutions to the market since 2004.

TransUnion

TransUnion

TransUnion is a global information and insights company that makes it possible for businesses and consumers to transact with confidence.

Flat6Labs

Flat6Labs

Flat6Labs is the MENA region’s leading seed and early stage venture capital firm, currently running the most renowned startup programs in the region.

Edgio

Edgio

Edgio provides unmatched speed, security, and simplicity at the edge through globally-scaled media and applications platforms.

Proximus Ada

Proximus Ada

Proximus Ada is the first Belgian center of excellence combining artificial intelligence and cybersecurity.

Convergence Networks

Convergence Networks

Convergence Networks is one of North America's leading Managed Services & Security Providers.

ViroSafe

ViroSafe

ViroSafe is a leading value-added distributor of IT security solutions in Norway.

P3M Works

P3M Works

P3M Works delivers Cyber Security and Digital Transformation projects across both private and public sector clients.