FREE TO VIEW


« Back to News

2015-10-06

AI - Reshaping the Workplace

AI-powered business applications will automate jobs, rather than just a task and the the effects will ripple across organizations.

2015-10-06

Russian Scientists Create Cockroach Robo-Spy

RoboRoach: Biologically inspired engineering to create an artificial organism which can be operated using a mobile app.

2015-10-06

Medical Devices Vulnerable to Hackers

Thousands of critical medical systems, such as MRI machines, are available for hackers to access online.

2015-10-07

Cyber Attacks Cost Business Over $300bn Worldwide Last Year

Research from Grant Thornton reveals that cyber attacks are taking a serious toll on business.

2015-10-05

Why Is China Hacking Norway?

Half of all cyber intrusions in the Nordic states target Norwegian companies and Norway seems to be the main target of Chinese hackers.

2015-10-05

India Discusses Cyber 9/11 Prevention

India is worried that it's Banking, IT & Service sectors are vulnerable to the threat of serious cyber attacks.

2015-10-02

U.S & China Talk Truce But Cyber War Remains

James Clapper, Director of National Intelligence, tells U.S Senate hearing on cybersecurity that he is not optimistic about the agreement.

2015-10-05

Integrating Video Analytics Technologies At Airports.

There is a critical need for finding solutions for more advanced security in airports.

2015-10-02

Karma Police: From Radio to Porn, British Spies Track Web Users’ Online Identities

There was a simple aim at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.”

2015-10-02

Edward Snowden Joins Twitter & Follows NSA

His opening tweet was: "Can you hear me now?"

2015-10-02

Social Media and the 'Information War’- Russia is Winning

The Kremlin wields a vast media apparatus to distort information, promote conspiracy theories & obfuscate observers about the crisis in Ukraine.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

ESL Bangladesh

ESL Bangladesh

ESL is the Largest IT Infrastructure & Telecom Service Provider in Bangladesh.

IAmI Authentications

IAmI Authentications

IAmI is a first in Tokenization Cloud-based IAM Security Services, delivering the most advanced form of Two-Factor Authentication.

Data Eliminate

Data Eliminate

Data Eliminate provide data destruction, secure end-of-life IT asset disposal, and data protection consultancy services.

YesWeHack

YesWeHack

YesWeHack offers companies an innovative approach to cybersecurity with Bug Bounty (pay-per-vulnerability discovered) to identify and report vulnerabilities in their systems.

iTechArt Group

iTechArt Group

iTechArt is a top-tier custom software development company offering Cybersecurity Consulting, Application Security Testing, Risk Management and Compliance, and Infrastructure Security services.

Hexaware Technologies

Hexaware Technologies

Hexaware is an automation-led next-generation service provider delivering excellence in IT, BPO and Consulting services.

Earlybird Venture Capital

Earlybird Venture Capital

Earlybird is a venture capital investor focused on European technology innovators.

SecurIT360

SecurIT360

SecurIT360 is a full-service specialized Cyber Security and Compliance consulting firm.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Sentryc

Sentryc

Sentryc provides automated monitoring of brands on online marketplaces and social media making online brand protection processes faster, more clearly structured and more efficient.

Security Compliance Associates (SCA)

Security Compliance Associates (SCA)

The sole focus of SCA is safeguarding critical information and complying with information security regulations.

Denodo

Denodo

Denodo transforms the way organizations operate by unifying their data assets in real time and making data ubiquitous and secure to all users and business applications.

Lighthouse IT

Lighthouse IT

At Lighthouse IT, we are focused on delivering seamless and reliable services to unlock the value of technology for your business.

Tracer

Tracer

Tracer (formerly Appdetex) is a next-generation brand protection solution. It constantly finds, analyzes, and stops brand abuse across Web2 and Web3 digital channels.

Invisily

Invisily

Invisily makes enterprise and cloud computing resources invisible to attackers with zero trust solutions, making them visible only when needed to only those who need them.

Nicos AG

Nicos AG

Nicos AG specializes in secure, global data communication.