FREE TO VIEW


« Back to News

2015-04-21

Data Privacy: The Tide Turns in EU

Europe is in the midst of a technological step change; a pivot in the world of data privacy.

2015-04-21

Human Rights Activists Want to Ban ‘Killer Robots’

There are serious moral and legal concerns surrounding fully autonomous weapons.

2015-04-20

JP Morgan Algorithm Identifies Rogue Employees

The Bank is rolling out a program to identify rogue employees before they go astray.

2015-04-17

Baltimore Police Use ‘Stingray’ Cellphone Surveillance

US Police deploy controversial 'Stingray' cellphone surveillance technology.

2015-04-16

INTERPOL Targets Cybercrime in Asia

Cybercrime is a game changer for law enforcement in Asia.

2015-04-21

How Syrian Electronic Army Hacked Email Accounts of Assad’s Opponents

The group of hackers aligned with Syrian President Bashar al-Assad have been busy.

2015-04-22

Russia's Cyber Attacks Grow More Brazen

Russia has ramped up cyber attacks against the United States to an unprecedented level.

2015-04-16

China’s Cyber Attacks on Governments and Corporates in Asia

The Chinese government is accused of being behind a newly discovered set of cyber attacks across Southeast Asia over the past ten years.

2015-04-22

NSA’s Plan to Snowden-Proof Data Using the Cloud

With NSA’s widespread adoption of cloud-based computing, the spy agency has made a big technology bet.

2015-04-22

The Internet Connected Car

By 2020 BI Intelligence estimates that 75% of cars shipped globally will be connected.

2015-04-21

Planes Without Pilots

The Centaur Optionally Piloted Aircraft can be operated unmanned or with pilots on board.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Akin Gump Strauss Hauer & Feld

Akin Gump Strauss Hauer & Feld

Akin is a leading global law firm providing innovative legal services and business solutions to individuals and institutions. Practice areas include Cybersecurity, Privacy and Data Protection.

CGI Group

CGI Group

CGI is a leading IT and business process services provider. Services include IT consulting, Systems Integration, Application Development, Infrastructure, Business Processes, Digital IP.

Brainloop

Brainloop

Brainloop's security architecture enables you to work on and distribute strictly confidential documents both within and beyond the firewall.

Temasoft

Temasoft

TEMASOFT is a software company focused on developing security and infrastructure products.

Genians

Genians

Genians provides the industry’s leading Network Access Control (NAC) solution, which ensures full visibility of all IP-enabled devices regardless of whether they are wired, wireless, or virtual.

National Initiative for Cybersecurity Education (NICE)

National Initiative for Cybersecurity Education (NICE)

NICE is a partnership between government, academia, and the private sector focused on cybersecurity education, training, and workforce development.

Axiomtek

Axiomtek

Axiomtek is a leading design and manufacturing company in the industrial computer and embedded field.

ThreatSwitch

ThreatSwitch

ThreatSwitch a software platform for cleared federal contractors to get and stay compliant with NISPOM and Conforming Change 2.

HUB Security

HUB Security

Hub Security provide Ultra Secure, Military Grade HSM (Hardware Security Module) Solutions for Blockchain and Digital Assets.

BlackCloak

BlackCloak

BlackCloak provides Concierge Cyber Security for high-net-worth individuals and corporate executives to protect them from cybercrime, reputational risks, hacking and identity theft.

ProCheckUp

ProCheckUp

ProCheckUp is a London-based independent provider of cyber security services, including IT Security, Assurance, Compliance and Incident Response.

Trustifi

Trustifi

Trustifi leads the market with the easiest to use and deploy email security products, providing both inbound and outbound email security from a single vendor.

Epoch Concepts

Epoch Concepts

Offering a full line of IT services, solutions, and integration capabilities, Epoch Concepts is the trusted partner of the US military, federal agencies, private enterprises, and systems integrators.

Blue Bastion

Blue Bastion

Don’t give cybercriminals the chance to find weaknesses in your company’s cyber security system. Defend your institution from all attacks from all directions with Blue Bastion.

Blockfence

Blockfence

Blockfence are a seasoned crew versed in enterprise-grade cybersecurity and crypto, on a mission to collaboratively shape the future of Web3 security.

Computer Futures

Computer Futures

Computer Futures are a global specialist IT recruitment partner, matching candidates with roles across niche IT markets and core technologies.