FREE TO VIEW


« Back to News

2019-11-01

GDPR Lessons Learned

Uncertainty and contradictions have defined the first year of General Data Protection Regulation (GDPR) enforcement. By Simon Fogg

2019-11-01

Cyber Intelligence & Business Strategy

The planet’s interconnected population will grow from 3.7 to 5 billion over the next 10 years and this has profound consequences for business.

2019-10-31

Facebook, Free Speech & Fake News

Arbiters Of Truth: Twitter's decision to cease political advertising renews pressure on Facebook to control the flow of fake news across its platform.

2019-10-30

Facebook Sues Over Spyware Planted On WhatsApp

Facebook turns aggressive and has filed legal action in California against Israeli NSO Group for allegedly hacking WhatsApp.

2019-10-30

Georgia Suffers A Nationwide Cyber Attack

The national TV station, justice system, thousands of websites including private companies, knocked offline and replaced with a threatening message.

2019-10-30

Google Claims Quantum Supremacy

The race to build the world's first useful quantum computer is nearing its end. Google are claiming victory over IBM. Why is that important?

2019-10-29

NCSC Stopped One Million Criminal Frauds

Britain's national cyber defence centre has thwarted more than one million cases of suspected payment card fraud in the last year.

2019-11-13

WEBINAR: How to Build a Threat Hunting Capability in AWS

November 21 | Do you know how to build an effective threat hunting program in your AWS environment? Learn from SANS and AWS experts.

2019-10-28

The Next Industrial Revolution

A fusion of technologies is blurring the lines between the physical, digital and biological spheres. Its a revolution.

2019-10-28

Cyber Insurance Will Reshape Cyber Security

Insurance firms with the best understanding of cyber security risk will spur businesses to take the actions needed to withstand attacks.

2019-10-28

British Government Funds Chip Maker To Build Cyber Resilience

The UK is partnering with Arm to develop new chip technologies that are more resistant to cyber threats, backed by £36 million in funding.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

RioRey

RioRey

The DDoS mitigation specialist, from single server to Enterprise wide carrier level networks the RioRey Solution provides effective immediate and easy to manage protection.

European Council on Foreign Relations (ECFR)

European Council on Foreign Relations (ECFR)

ECFR is a pan-European think-tank conducting research and promote informed debate on European foreign policy. Cyber security is becoming an intrinsic element of foreign policy debate.

CGI Group

CGI Group

CGI is a leading IT and business process services provider. Services include IT consulting, Systems Integration, Application Development, Infrastructure, Business Processes, Digital IP.

AML Solutions

AML Solutions

AML Solutions offer a full range of Anti-Money Laundering and Countering the Financing of Terrorism (AML/CFT) services.

KoolSpan

KoolSpan

KoolSpan’s security and privacy solutions address the growing threat of loss or theft of intellectual property, information, and proprietary assets.

Cipher Security

Cipher Security

Cipher Security provides unique robustness tests and penetration tests, as well as customizable development services for vendors and providers.

BlueID

BlueID

BlueID is an IDaaS technology product which enables your objects to securely connect and interact with your users’ smart phones and smart watches.

VerifyMe

VerifyMe

VerifyMe is a global technology solutions company delivering brand protection offerings to mitigate counterfeiting, product diversion, and illicit trade.

AnubisNetworks

AnubisNetworks

AnubisNetworks is one of Europe’s leading threat intelligence and email security suppliers.

Digital Security

Digital Security

Digital Security is an Ecuadorian company specialized in providing comprehensive information security solutions.

Excelerate Systems

Excelerate Systems

Excelerate Systems is a leading provider of IT services with a focus on Big Data, Cloud Services and Security.

Wise-Mon

Wise-Mon

Wise-Mon is expert in its field of network monitoring and control. We give solutions to huge organizations with tens of thousands of ports, as well as small companies with one switch.

Option3

Option3

Option3 (formerly Option3Ventures - O3V) primarily seek control investments in the growing cybersecurity mid-market, seeking to build champions with the scale to bring cutting-edge products to market.

Prism Infosec

Prism Infosec

Prism Infosec is an award-winning independent cyber security consultancy, CREST STAR, NCSC CHECK member, CAA ASSURE audit provider and PCI Qualified Security Assessor.

RapidSpike

RapidSpike

RapidSpike is the only website monitoring solution that focuses all three key aspects of website health: performance, reliability AND security.

Sunnic

Sunnic

Sunnic is a leading provider of comprehensive digital data security technology.