FREE TO VIEW


« Back to News

2016-03-08

One Ethicist’s Compromise To Stop Killer Robots

If the United Nations won’t stop killer robots the United States could make a start by setting some rules limiting their development and use.

2016-03-11

Japan's Critical Infrastructure Under Cyberattack

Waves of cyber attacks against key industries across Japan, S. Korea, the United States, Europe and other Southeast Asian countries. But where from?

2016-03-11

3D Printing: The Next Industrial Revolution

3D printing could disrupt mass-production as we know it. Could we possibly be on the verge of replacing mass production altogether?

2016-03-11

World’s First Wearable Translator

Our most primal myths warn us of the risks of disjointed communications. This is about to change.

2016-03-09

Open Source Intelligence: Special Ops In Syria Exposed

An unparalleled level of transparency accessible at the click of a mouse is exposing the deployment of military assets.

2016-03-09

Dark Territory: The Secret History of Cyber War

Fred Kaplan's Secret History of Cyberwar: When it comes to the questions of conflict in the digital age, “we’re wandering in dark territory.”

2016-03-11

UK: Twitter To Train Prosecutors To Fight Online Abuse

The Internet is increasingly used as a weapon by perpetrators of domestic abuse, rape and sexual violence against women.

2016-03-08

Many Organisations Are Too Lax About Mobile Data Threats

Mobile devices can be a critical part of any cyber attack and mobile data breaches are more common than you might think.

2016-03-08

US Military Are Doubling Down On Robot Wars

The US military are investing heavily in a new generation of unmanned, autonomous weapons.

2016-03-07

Canada Cuts 5 Eye Intelligence Sharing

Canada slams on the brakes on sharing some communications intelligence out of fear that Canadians' personal information is unprotected.

2016-03-09

Reduce Risk With Threat Intelligence

Do you want to be more proactive in managing risk? What is the risk if you don’t pay attention to knowledge learned from previous events?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) - University of Kent

Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) - University of Kent

KirCCS harnesses expertise across Kent University to address current and potential cyber security challenges.

Optimum Insurance

Optimum Insurance

Optimum's Cyber Risk & Data Protection Insurance policies are designed to protect against cyber exposures that arise when a company’s data and customer information is breached or stolen.

ABS Group

ABS Group

ABS Group provides risk and reliability solutions and technical services that help clients confirm the safety, integrity and security of critical assets and operations.

BIND 4.0

BIND 4.0

Bind 4.0 is an acceleration program geared toward tech startups with solutions applied to Advanced Manufacturing, Smart Energy, Health Tech or Food Tech fields.

Stealth Software Technologies

Stealth Software Technologies

Stealth Software Technologies is focused on the generation of research and software products focused on applied cryptography and cybersecurity.

CISO Global

CISO Global

CISO Global (formerly Cerberus Sentinel) are on a mission to demystify and accelerate our clients’ journey to cyber resilience, empowering organizations to securely grow, operate, and innovate.

Safe Systems

Safe Systems

Safe Systems provide compliance centric IT services for community banks and credit unions, ensuring that they are kept up to date on current technologies, security risks, and regulatory changes.

Cheops Technology

Cheops Technology

Cheops is a specialist in IT Business Technology Services. We help SMEs and large companies build, optimize and manage their IT so they can focus on their core business.

Security Risk Management (SRM)

Security Risk Management (SRM)

SRM provide a comprehensive security risk management service encompassing people, processes, technology, governance, compliance and risk management.

ZX Security

ZX Security

ZX Security is a New Zealand owned and operated cyber security consultancy.

DigitalPlatforms

DigitalPlatforms

DigitalPlatforms SpA is an Italian group with the mission of providing end-to-end solutions and Internet of Things and Cyber technologies to companies that manage critical infrastructures.

CloudCoCo

CloudCoCo

CloudCoCo help UK businesses of all sizes and industries succeed by providing enterprise-grade technology at small-business prices.

Orchestrate Technologies

Orchestrate Technologies

Orchestrate Technologies provides computer network and IT managed services for small and mid-market clients as well as small enterprise businesses.

3DOT Solutions

3DOT Solutions

3DOT Solutions is an established UK cybersecurity consultancy focused on delivering end-to-end cyber security solutions for private and public sector customers.

Xmore AI

Xmore AI

Xmore AI, an emerging disruptor in our incubation, is building AI models to optimize and secure IT with the mission of increasing efficiency and reducing costs.

CrashPlan

CrashPlan

CrashPlan provides peace of mind through secure, scalable, and straightforward endpoint data backup.