FREE TO VIEW


« Back to News

2015-07-15

WikiLeaks and the NSA’s Hobby of Spying On Allies

U.S. economic espionage extends to the key European institutions and issues such as the EU Central Bank and Greek crisis

2015-07-15

The Third Industrial Revolution

A third industrial revolution is under way & like all revolutions, this one will be disruptive.

2015-07-15

Unlocking the Potential of the Internet of Things

McKinsey think that the IoT has a total potential economic impact of $3.9 trillion to $11.1 trillion a year by 2025.

2015-07-15

FBI - Encryption is Great as Long as it Still Lets Us In

Too-tough-to-crack encryption poses a threat to national security.

2015-07-13

British PM Wants To Ban Encryption

British government on a collision course with Apple, Facebook,Google...

2015-07-13

Use Threat Intelligence to Boost Mobile Security

Security professionals recommend companies integrate threat intelligence about cyber security with mobile device management platforms.

2015-07-13

Terrorists’ Social Media Output Under Scrutiny

UN panel asks social-media companies to respond on how terrorist groups use their networks to spread propaganda.

2015-07-10

Espionage Lessons from the OPM Hack

Three lessons emerge that might give us hope for a secure future.

2015-07-10

Data Scientist: The Sexiest Job of the 21st Century

Automated solutions, whether hardware or software, are getting cheaper, faster & more versatile at an ever-increasing rate.

2015-07-10

UK Police 'Skim the Surface' of Cybercrime

Britain's top cop says the UK Police are falling well short in their efforts to tackle cybercrime.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Bastille

Bastille

Bastille’s patented software and security sensors bring visibility to devices emitting radio signals (Wi-Fi, cellular, IoT) in your organization.

Mega

Mega

Mega is a secure cloud data storage provider with browser-based high-performance end-to-end encryption.

IAC

IAC

IAC is a specialist Irecruitment consultancy covering Internal Audit, Risk, Controls, Governance, IT Audit, and Cyber Security roles.

Bavarian IT Security Cluster

Bavarian IT Security Cluster

The Bavarian IT Security Cluster works to build regional IT security competencies and increase the competitiveness and market opportunities of its member companies.

DataDome

DataDome

DataDome offers real-time AI protection against all OWASP automated threats, including credential stuffing, layer 7 DDoS attacks, SQL injection & intensive scraping.

CorkBIC International Security Accelerator

CorkBIC International Security Accelerator

CorkBIC International Security Accelerator invests in early stage disruptive companies in the security industry including, Cybersecurity, Internet of Things (IOT), Blockchain and AI.

Titans24

Titans24

Titans24 is a Software-as-a-Service security platform for web applications. It prevents attacks on business websites that are protected under 11 cyber-security layers.

Alpine Security

Alpine Security

Alpine Security provides penetration testing, security assessments and cybersecurity training services.

SecureData

SecureData

SecureData provide professional data recovery services, digital forensics, data recovery software and FIPS 140-2 Level 3 Validated hardware encrypted drives.

CyberX9

CyberX9

CyberX9 helps you protect against a wide range of cyber attacks whether you are a business or a high-net worth individual under risk.

Acora

Acora

Acora provide a range of best-in-class managed services, Microsoft-centric business software, and cloud solutions designed to help mid-market organisations succeed in the digital economy.

Extreme Networks

Extreme Networks

Since 1996, Extreme has been pushing the boundaries of networking technology, driven by a vision of making it simpler and faster as well as more agile and secure.

SecureChain AI

SecureChain AI

SecureChain are combining blockchain and AI technology to create a smarter blockchain platform especially in terms of security.

Resonance Security

Resonance Security

Resonance offers powerful cybersecurity aggregation software that makes protecting against full spectrum cybersecurity threats effortless no matter what your technical level, budget, or scope.

5S Technologies

5S Technologies

5S Technologies is a regional IT solutions and services provider based in Cary, NC and serving the Carolinas.

TeamT5

TeamT5

TeamT5 Inc. is a leading cybersecurity company dedicated to cyber threat research and solutions.