FREE TO VIEW


« Back to News

2016-04-27

Snowden On Police Chasing Journalist’s Data

Edward Snowden has condemned Australian law enforcement for collecting a journalist's communications records without a warrant.

2016-04-23

Smart UAE Police Cars For Expo 2020

The roads of the UAE will be patrolled by smart police cars equipped with remote control features, cameras & radars in time Expo 2020.

2016-04-24

#PanamaPapers: The Biggest Leak In History

'More data than you have ever seen'. Are we about to witness a new era of Mega Leaks?

2016-04-19

CYBERCOM Elevated To Full Combatant Command Status

Cyber warriors are today not just defending military networks but joining in combined-arms attacks on the enemy.

2016-04-22

Convoy Of Self Driving Trucks Completes European Cross-Border Trip

A ‘Platoon’ of wireless-linked trucks arrived safely in Netherlands port city of Rotterdam, giving a glimpse of the future of road haulage.

2016-04-19

Seven Profiles Of Highly Risky Insiders

To understand these insiders and why they pose a risk, start by looking at the root of the problem.

2016-04-20

The Growing Cyber Threat From Iran

The Islamic Republic of Iran has been steadily developing its cyber offensive capabilities and can now offer a significant threat.

2016-04-21

‘Eye In The Sky’: The Reality Of Drone Warfare Revealed

‘Eye in the Sky’ is a thrillingly intelligent exploration of the political and ethical questions surrounding drone warfare.

2016-04-24

Cyber Threat Intelligence: Sharing Is Caring

Shared cyber-threat intelligence is a critical component of security, enabling organizations to protect digital assets & respond quickly to new threats.

2016-04-25

The Delayed FinTech Revolution

Modern digital technology has not yet transformed financial services. Open data is the key to change in this sector of the economy.

2016-04-25

Cyber Insurer Offers Some Ransomware Insights

A significant number of Hospitals have fallen prey to malware attacks in recent weeks and the No.1 issue is employee negligence.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CERT-PA

CERT-PA

CERT-PA is the national Computer Emergency Response Team for Italian government institutions.

GuardKnox

GuardKnox

GuardKnox protects the users of connected vehicles against threats that can endanger their physical safety and the safety of their personal information.

RevenueStream

RevenueStream

RevenueStream uses an innovative algorithmic approach to intercept and prevent payment fraud before it even happens.

Cyber Seguridad (Cyberseg)

Cyber Seguridad (Cyberseg)

Cyberseg provides specialized Cybersecurity services, including managed services (SOC / CERTs) and solutions for the protection of critical infrastructures.

Cyxtera Technologies

Cyxtera Technologies

Cyxtera offers powerful, secure IT infrastructure capabilities paired with agile, dynamic software-defined security.

CyberSAFE Malaysia

CyberSAFE Malaysia

CyberSAFE Malaysia is an initiative to educate and enhance the awareness of the general public on the technological and social issues and risks facing internet users.

ISA Global Cybersecurity Alliance (ISAGCA)

ISA Global Cybersecurity Alliance (ISAGCA)

Objectives of the ISA Global Cybersecurity Alliance include the acceleration and expansion of standards, certification, education programs, advocacy efforts, and thought leadership.

Zemana

Zemana

Zemana provides innovative cyber-security solutions to deal with complex malicious software and other cyber threats.

GovernmentCIO

GovernmentCIO

GovernmentCIO was founded with a single purpose: to transform government IT. We are thought leaders in data analytics, machine learning, cybersecurity and IT transformation.

Bright Data

Bright Data

Bright Data Inc is the world’s #1 web data platform, enabling organizations to research, monitor, analyze data, and make better decisions.

Oregon Systems

Oregon Systems

Oregon Systems is a Regional Leader & Distributor with value added services for OT, IoT, IIoT & IT Cybersecurity products, Solutions & professional services throughout the middle-east region.

Allurity

Allurity

Allurity is a group of tech-enabled cybersecurity service providers, comprised of best-in-class experts with a common mission to enable a safe digital world.

Digital Security by Design (DSbD)

Digital Security by Design (DSbD)

Digital Security by Design is an initiative supported by the UK government to transform digital technology and create a more resilient, and secure foundation for a safer future.

Filigran

Filigran

Filigran provides threat intelligence, adversary simulation and crisis response open solutions to thousands of cybersecurity and crisis management teams across the world.

Interlynk

Interlynk

Interlynk's #SBOM and # VEX-powered platform automates and continuously monitors first-party and vendor software supply chains and helps meet #FDA, #CRA, #GSA, and #DoD compliance obligations.

A&O Shearman

A&O Shearman

A&O Shearman is a law firm at the forefront of the forces changing the current of global business: energy transition, life sciences, technology, private capital, finance and beyond.