FREE TO VIEW


« Back to News

2016-06-30

Lessons Learned From Major Healthcare Breaches

Huge amounts of personal health data being collected, shared & analyzed. There are more reasons to worry about patient privacy than ever.

2016-07-04

Enhanced Attribution: An Engine To Identify Hackers

DARPA's “Enhanced Attribution Program” will enable US government agencies to characterize an attacker and predict where they will strike next.

2016-07-04

Technology Advances Too Fast For Government

The former head of the US Defense Advanced Research Projects Agency warns that technology is advancing too fast for governments to keep up.

2016-06-28

Responding To Russia´s Cyber Aggression

Russia or China? NATO needs to step up and agree who’s the biggest cyber threat

2016-06-29

Top 10 Technologies For Information Security

Research firm Gartner have picked the top 10 technologies for information security and their implications for security organizations in 2016.

2016-07-04

How Will IOT Change Banking?

The banking industry is now starting to see the various potential ways in which IoT can help to take it to the next level.

2016-06-28

UK Cybercrime Now Costs £1 Billion And Attacks Are Up 22%

British businesses have been rocked by a 22% increase in cyber-crime in the past year, losing over £1bn in the process.

2016-06-28

China & US Are ‘Eliminating Dangerous Spying Phase’

China And US cybersecurity talks are reaching for an agreement to eliminate “random factors” that can begin a cyberwar.

2016-06-30

NATO Does Not Appear To Have A Clear Cyberwar Strategy

NATO commanders do not seem prepared to take aggressive countermeasures against low-level probes, espionage and cyber attacks.

2016-06-30

Intelligent Robots And Automation Encroaching On All Industry Sectors

We’re seeing automation of labor across every industry, including manufacturing, wealth management and medicine.

2016-06-29

ISIS, The Pentagon & The Lone Wolf Syndrome

As the counter-terrorism battle moves online, DARPA seeks to track how ISIS spreads its ideas, and how well the it's defenses are working.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

GuardKnox

GuardKnox

GuardKnox protects the users of connected vehicles against threats that can endanger their physical safety and the safety of their personal information.

Intrasoft International

Intrasoft International

Intrasoft International is a leading European IT Solutions and Services Group offering a full range of IT services including Information Security.

Windscribe

Windscribe

Windscribe is a Virtual Private Network services provider offering secure encrypted access to the internet.

Uppsala Security

Uppsala Security

Uppsala Security built the first crowdsourced Threat Intelligence platform known as the Sentinel Protocol, which is powered by blockchain technology.

CSIRT Italia

CSIRT Italia

CSIRT Italia is the national Computer Security Incident Response Team for Italy.

Alias Robotics

Alias Robotics

Alias Robotics is a robot cyber security company. We deliver cyber security solutions for robots and robot components.

Prosperoware

Prosperoware

Prosperoware develop software for cybersecurity, privacy, and regulatory compliance for content systems, and financial matter management.

Qohash

Qohash

With a focus on data security, Qohash supports security, compliance and optimization use cases enhancing your risk management process.

ImmuniWeb

ImmuniWeb

We Simplify, Accelerate and Reduce Costs of Security Testing, Protection and Compliance.

Abu Dhabi Gov Digital

Abu Dhabi Gov Digital

Gov Digital (formerly Abu Dhabi Digital Authority - ADDA) enable, support and deliver a digital government that is proactive, personalised, collaborative and secure.

StealthPath

StealthPath

StealthPath is focused on endpoint protection, securing the “implicit trust” vulnerabilities of current leading information security solutions.

Saffron Networks

Saffron Networks

Saffron Networks is an ISO-certified company. We assure our clients of reliable solutions, specifically with the Security landscape and Enterprise Networking.

SecurEnvoy

SecurEnvoy

SecurEnvoy are a leader in designing zero access trust solutions using the latest cutting-edge technologies, to protect your users, devices and data, whatever the location.

WBM Technologies

WBM Technologies

WBM Technologies is a Western Canadian leader in the provision of outcomes-driven information technology solutions.

Focus Group

Focus Group

Focus Group are one of the UK’s leading independent providers of essential business technology. Here to take care of all your telecoms, IT and connectivity services.

Adili Group

Adili Group

Adili Group is a leading pan-African corporate advisory firm. We deliver tailored solutions in regulation and compliance, risk management, and improving business efficiency.