FREE TO VIEW


« Back to News

2016-10-05

The Dilemma Of Predictive Policing

How Police authorities respond to information gathered using computer modelling is at least as important as the predictions themselves.

2016-10-14

The Self-Fulfilling Prophecy Of Intelligent Automation

Intelligent automation is going through a rapid democratisation and should no longer be seen as a nightmare of unpredictable, threatening robots.

2016-10-10

How Easy Would It Be To Hack Your Business?

The most important thing any firm can do to protect itself from hacks – both visual and cyber – is to change the way it thinks.

2016-10-11

Cyber Terrorism Keeps At Least One Top FBI Agent Awake At Night

As terror groups direct sympathizers to conduct physical and cyber attacks around the world, the US capital is becoming a more frequent target.

2016-10-13

In New Zealand, Hacking Is A Serious Business

The concerns of New Zealand's leading chief executives vary but if there is anything close to a consensus, it is that cybersecurity is major one.

2016-10-10

Surprise: FBI Say US Political Hacks ‘Probably Was Russia’

A consensus among law enforcement and security analysts: Russian intelligence was almost certainly involved in US election hacks.

2016-10-12

Strategies For A Culture of Cyber-Security

Information security can be an overwhelming concept to grasp, but it's vital to protecting your sensitive business data.

2016-10-11

Islamic State Cyber Attacks

Recent convictions show that IS make a very real national security cyber threat that results from the combination of terrorism & hacking.

2016-10-10

IoT 2.0: The Internet of Things-to-Things

Once just basic sensors collecting business data for operational tasks, now, the IoT is making connections across the value chain.

2016-10-05

Otto: Uber Acquires Self-Driving Lorry Startup

Uber is fast diversifying beyond its core business. Self- driving technology for large goods vehicles is the latest on the shopping list.

2016-10-08

The Internet Is No Place For Elections

Political scientists and technical experts are saying public elections should stay offline. US Citizens cannot trust the internet with their vote.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CyberPolicy

CyberPolicy

CyberPolicy is a cyber protection solution for small businesses. It combines three important components against cyber threats - Cyber Plan, Cybersecurity and Cyber Insurance.

Rockwell Automation

Rockwell Automation

Rockwell Automation offer industrial security solutions to protect the integrity and availability of your complex automation solutions.

Norton

Norton

NortonLifeLock is dedicated to helping secure the devices, identities, online privacy, and home and family needs of approximately 50 million consumers.

Infowhiz solutions

Infowhiz solutions

Infowhiz provides solutions for backup/disaster recovery and network security.

KLDiscovery

KLDiscovery

KLDiscovery is a global leader in delivering best-in-class eDiscovery, information governance and data recovery solutions.

Uppsala Security

Uppsala Security

Uppsala Security built the first crowdsourced Threat Intelligence platform known as the Sentinel Protocol, which is powered by blockchain technology.

Risk Based Security (RBS)

Risk Based Security (RBS)

Risk Based Security provide the most comprehensive and timely vulnerability intelligence, breach data and risk ratings.

Tehtris

Tehtris

TEHTRIS XDR Platform was developed to control and improve the IT security of private and public companies against advanced cyber threats such as cyber espionage or cyber sabotage activities.

Zaviant Consulting

Zaviant Consulting

Zaviant Consulting is a leading data security and privacy consulting firm assisting organizations comply with constantly evolving security frameworks and privacy regulations.

Tidal Cyber

Tidal Cyber

We formed Tidal for one simple reason—we believe that defenders need and deserve tools and services that make achieving the benefits of threat-informed defense practical and sustainable.

Unified Solutions

Unified Solutions

Unified Solutions provide a full continuum of cyber security services, compliance, and technology solutions.

ThreatNix

ThreatNix

ThreatNix is a tight knit group of experienced security professionals who are committed to providing competent cybersecurity solutions that adhere to international standards.

Fulcrum IT Partners

Fulcrum IT Partners

Fulcrum IT Partners is the parent company of an expanding portfolio of established IT solution companies around the world with proven expertise in cyber security, cloud, and managed services.

Cypago

Cypago

Cypago provides a powerful yet easy-to-use Compliance Orchestration Platform to automate the compliance process end-to-end.

Wired Assurance

Wired Assurance

Wired Assurance is a testing and assurance company, specialized in software applications and blockchain smart contracts.

Surf Security

Surf Security

SURF Security has transformed the browser into your strongest security asset while providing complete end-user privacy – all with full compliance.