FREE TO VIEW


« Back to News

2016-02-05

Will Robots Save The Future Of Work?

Is a robot coming for your job? If Gartner’s predictions are correct, the answer could be leaning more definitively toward yes.

2016-02-05

GCHQ Telephone Security Is 'open to surveillance'

Software developed by the UK intelligence agency GCHQ contains weaknesses making it possible to eavesdrop on phone calls.

2016-02-05

US Critical Infrastructure Is At Cyber Risk

Modern warfare or crime fighting is not just about bullets, bombs and missiles in physical space. It’s also about hacking in cyber space.

2016-02-06

After The OPM Hack Security Clearances Will Now Be Done By The Pentagon

OPM Dumped: The US is shifting the responsibility for background investigations of sensitive personnel to the Defense Department.

2016-02-02

90% of Data Breaches Are Avoidable

Nine of every ten data breaches in 2015 could have been “easily prevented,” according to a study by The Online Trust Association.

2016-02-03

Healthcare Data Is The Holy Grail for Cyber Thieves

Sophisticated hackers looking to lift the treasure trove of information found in health records are now the leading cause of data loss.

2016-02-03

Facebook’s Next New Data Center Is Coming To Ireland

Renewable Energy & Low Taxes: Facebook announces it plans to open its second European data center in Ireland.

2016-02-06

The Internet of Things Needs Another 10 Years

The IoT is an exciting growth opportunity. The problem is that it is really many different opportunities, each growing at its own pace.

2016-02-03

China & Indonesia Engage In Joint Cyber War Simulations

Indonesia and China's cooperation suggests that weaker nations cannot provide national cyber security on their own.

2016-02-03

The EU Wants To Organise The New Tech Economy

Look Out! The EU Commission is developing a strategy and an action plan to support the digitalisation of European industry.

2016-02-03

Europe’s Digital Watchdog Zeros In On US Tech

France’s top privacy regulator will police how digital data is transferred outside of the European Union, putting pressure on US companies' profits.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Law Enforcement Cyber Center (LECC)

Law Enforcement Cyber Center (LECC)

LECC is designed to assist police, digital forensic investigators, detectives, and prosecutors who are investigating and preventing crimes that involve technology.

Beachhead Solutions

Beachhead Solutions

Beachhead's SimplySecure is a configurable, web-based management tool allowing you to remotely secure vulnerable mobile devices in your organization.

GTB Technologies

GTB Technologies

GTB Technologies is a cyber security company that focuses on providing enterprise class data protection and data loss prevention solutions.

Panaseer

Panaseer

Panaseer is an enterprise cybersecurity automation and data analytics company that helps organizations stop preventable breaches by ensuring security controls are working effectively.

AcceptLocal

AcceptLocal

AcceptLocal is a payments industry consultancy with expertise in payment processing, payment security, anti-money laundering and fraud prevention.

Synack

Synack

Synack provides a hacker-powered intelligence platform that uncovers security vulnerabilities that often remain undetected by traditional pen testers and scanners.

Logsign

Logsign

Logsign is a Security Orchestration, Automation and Response (SOAR) platform with next-gen Security Information and Event Management (SIEM) solution.

itbox.online

itbox.online

Itbox.online offers IT solutions to ensure that your company's technologies are always available and secure as your business demands.

Xilinx

Xilinx

Xilinx is the inventor of the FPGA, programmable SoCs, and now, the ACAP. We are building the Adaptable, Intelligent World.

Glilot Capital Partners

Glilot Capital Partners

Glilot Capital Partners is an Israeli seed and early-stage VC. We specialize in businesses which disrupt enterprise technology, mainly in the fields of AI, big data and cybersecurity.

Raqmiyat

Raqmiyat

Raqmiyat provides end-to-end IT Services and business solutions including consultancy, digital transformation, infrastructure and cybersecurity.

Stratosphere Networks

Stratosphere Networks

Stratosphere Networks offer managed cybersecurity services rooted in Managed Detection and Response and Security Operations Center services that our team can tailor to meet your needs.

Yoti

Yoti

Yoti offer a suite of business solutions that span identity verification, age estimation, e-signing and AI anti-spoofing technologies.

Shorebreak Security

Shorebreak Security

Shorebreak Securioty specialize in conducting highly accurate, safe, and reliable Information Security tests to determine the risks posed to your business.

Tech Vedika

Tech Vedika

Tech Vedika has access to technical guidance, training and resources from AWS to successfully undertake solution architecture, application development, application migration, and managed services.

NetGain Technologies

NetGain Technologies

NetGain Technologies helps small to medium-sized businesses gain access to expert IT talent. We provide strategies that use technology as a driving force behind business growth.