FREE TO VIEW


« Back to News

2016-03-21

Now Surveillance 'aggressive-invasive': Snowden

Edward Snowden, known for revealing the extent of surveillance by US intelligence, says it is "more aggressive and invasive today than it was before".

2016-06-24

'Brexit' Could Put Data Sharing in Jeopardy

A vote to leave and the passing of the IP Bill could see a ban on the transfer of data between the UK and EU. Opinion by Emily Taylor

2016-03-15

Hard Lessons From The Cyberattack On Ukraine

Investigation into cyberattacks that caused rolling blackouts in Ukraine reveal how vulnerable power suppliers are to malware.

2016-03-15

Russian Scientists Have Solved Light-Based Computers

High-performance microprocessors that harness photons rather than electrons promise to make computers up to a thousand times more efficient.

2016-03-14

Cybersecurity Skill Shortage Has Industry Worried

Years of massive hacker attacks on industry & government has led to a surge in cybersecurity jobs outpacing the supply of people to fill them.

2016-03-18

Fighting The Invisible War In CyberSpace

Cyberattacks can damage critical infrastructure, steal government secrets and even retaliate against private companies for political reasons.

2016-03-15

China’s Quantum Satellite Changes Cryptography

China is fast becoming a world leader in quantum communications technology.

2016-03-16

Is The Cybersecurity Market Facing A Downturn?

Recently cybersecurity has stood out as one of the strongest segments of the tech sector, but the market may be cooling down in 2016.

2016-03-18

Why Do We Fall For Online Scams?

Scams are big business. It is becoming increasingly difficult to keep up with the range of scenarios being used to con people out of their money.

2016-03-14

Brand Reputation Includes Cyber Safety

Marketing collects tons of Big Data and, in the simplest terms, if malicious actors get to your data, your brand can be tarnished.

2016-03-16

Data Security Puts Innovation At Risk

As the challenge of protecting users, applications & data against cyberattack grows, organisations are struggling to innovate whilst staying secure.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Panzura

Panzura

Panzura optimizes enterprise data storage management and distribution in the cloud, making cloud storage simple and secure.

OASIS Open

OASIS Open

OASIS Open is where individuals, organizations, and governments come together to solve some of the world’s biggest technical challenges through the development of open code and open standards.

European Network for Cyber Security (ENCS)

European Network for Cyber Security (ENCS)

ENCS’s core focus is around educating and solving cyber security challenges in the development and operation of energy grids across Europe.

FoxGuard Solutions

FoxGuard Solutions

FoxGuard Solutions develops customized cyber security, compliance and industrial computing solutions for critical infrastructure entities and control system vendors.

ShadowDragon

ShadowDragon

ShadowDragon develops digital tools that simplify the complexities of modern investigations that involve multiple online environments and technologies.

Sistem Integra (SISB)

Sistem Integra (SISB)

SISB provide IT Security Infrastructure & Development, Mechanical & Electrical Services, Fire Safety & Detection Services, Facilities Management & Application Development.

Pentagon Group

Pentagon Group

Pentagon Group is a provider of security services in high-risk environments, remote areas and emerging markets in support of land-based, aviation, maritime and cyber operations.

Braintrace

Braintrace

Braintrace’s services include Managed Detection and Response (MDR), Managed SIEM, SIEM-as-a-Service, SOC-as-a-Service, Advisory Services, and Incident Response.

comforte AG

comforte AG

comforte AG is a leading provider of data-centric security technology. Organizations worldwide rely on our tokenization and format-preserving encryption capabilities to secure personal, sensitive data

ECS Ethiopia

ECS Ethiopia

ECS Ethiopia provides Ethiopia’s leading institutions with top cyber-security expertise and technology to enable them to overcome risks and market barriers enabling them to grow their business.

NSI Global

NSI Global

NSI Global is a specialist Global Risk and Intelligence Advisory Firm that has built a reputation for consistently managing complex projects.

Emerge Digital

Emerge Digital

Emerge Digital is a technology and digital innovation business and Managed Services Provider providing solutions to SMEs.

SignMyCode

SignMyCode

SignMyCode is a one-stop shop for trusted and authentic code signing solutions to safeguard software.

Texaport

Texaport

Texaport's vision is to be the trusted partner of choice for organisations seeking comprehensive IT management and cutting-edge security solutions.

Neeve

Neeve

Neeve is an edge cloud platform transforming smart buildings and spaces, making them more secure, smarter, and more sustainable.