FREE TO VIEW


« Back to News

2016-06-27

US National Cybersecurity Plan Costs $19b

The US Government is contemplating a one-stop shop for agencies to buy cyber-incident response services as part of an expensive cybersecurity plan.

2016-06-27

British Companies Buy Bitcoins As Ransom Money

A cyber-security survey finds that one third of UK companies are buying Bitcoin in anticipation of ransomware attacks.

2016-06-27

Beware: Top Cyber Scams To Avoid This Summer

The summer months hold a treasure trove for cybercriminals wanting to take advantage of unsuspecting victims.

2016-06-24

Insurers Want A Comprehensive Cyber Attack Database

The head of the Association of British Insurers wants to create a database where companies would have to record details of cyber attacks.

2016-06-25

Protecting the Next Generation: Make It Personal

We need to recognise the issues that are fundamental to protecting future generations and take advantage of all that the digital age provides.

2016-06-24

Video-Gaming Is The Next Cybercrime Target

Any endeavor that makes money quickly draws the attention of fraudsters and thieves, and videogames are no exception.

2016-06-24

UK’s Cybersecurity Policy For Business

Despite some policy confusion, the British government has decided to embrace cloud computing as a way of combating cyber-attacks.

2016-06-23

Preliminary Agreement On Airline Cybersecurity

An industry panel will propose a broad package of cyber protection measures, including cockpit alarms in the event an aircraft is hacked.

2016-06-23

An Inside Job: Looking For Cyber Criminals

The use of technology has outpaced cybersecurity literacy. All employees need to improve their knowledge & awareness of security issues.

2016-06-23

Email Scams: Criminals Try To Steal $3bn

The FBI say that 'business email compromise' is an increasingly successful form of fraud against businesses.

2016-06-23

Is An ISIS Nuclear Attack In Europe Really A Threat?

Some senior Statesman are saying that the risk of a nuclear attack in Europe is at the highest level in 30 years.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Vertical Structure

Vertical Structure

Vertical Structure services include Security & Penetration Testing, Information Assurance, Bespoke Training Programs and Secure Hosting.

Digital Shadows

Digital Shadows

Digital Shadows is a cyber threat intelligence company that helps clients discover sensitive data exposed through social media, cloud services and mobile devices

Howden Broking Group

Howden Broking Group

Howden provides a range of specialist insurance solutions to clients around the world including Cyber Liability insurance.

Data Shepherd

Data Shepherd

Data Shepherds primary focus is to protect your business. We achieve this by offering extensive and unique expertise in innovative IT and Cyber security solutions.

Dispersive Networks

Dispersive Networks

Dispersive Virtual Network is a carrier-grade software-defined programmable network that is inspired by battlefield-proven wireless radio techniques.

Alsid

Alsid

Alsid helps corporates to anticipate attacks by detecting breaches before hackers can exploit them.

Humming Heads

Humming Heads

Humming Heads offers a complete solution to fight the advanced threats that target a company's endpoints and servers.

Sectyne

Sectyne

Sectyne is a full-stack cyber consultancy committed to providing tailored services, advisory consultations, and training.

Avetta

Avetta

Avetta One is the industry’s largest Supply Chain Risk Management (SCRM) platform. It enables clients to manage supply chain risks and suppliers to prove the value of their business.

Altospam

Altospam

Altospam is a full service corporate email protection, integrating multiple security levels for your emails.

Involta

Involta

Involta orchestrates IT transformation journeys using well-defined and rigorous processes to deliver hybrid cloud solutions, consulting and data center services tailored to our clients’ needs.

Artjoker

Artjoker

Artjoker is a full cycle software development partner specialized in Blockchain projects and smart contract development including full cycle information security of all projects.

Threatsys Technologies

Threatsys Technologies

Threatsys’s Integrated cyber security process helps your organizations to ensure that it’s secure from any fraudulent attacks.

Readynez

Readynez

Readynez is the digital skills concierge service that helps you ensure your workforce has the tech skills and resources needed to stay ahead of the digital curve.

Zeron

Zeron

Zeron build bridges between security teams and top management. Our platform unifies your cyber risk posture seamlessly, encompassing threat insights and quantifiable risk scenarios.

Finlaw Associates

Finlaw Associates

Finlaw Associates is a trusted cybercrime law firm providing a wide range of taxation, legal, advisory and regulatory services to the financial, commercial and industrial communities.