FREE TO VIEW


« Back to News

2019-09-10

What Is The Internet of Things?

Fast becoming the one of the most important changes in business, the IoT is also taking effect across government and social networks.

2019-09-10

British Revenue & Customs Want A Head of Cyber Security Operations

Career Opportunities: Ensuring that HMRC’s risks to systems, assets, data and capabilities are understood and adequately managed.

2019-09-09

Stuxnet Virus Attack Details Emerge

An enduring mystery has surrounded the Stuxnet virus attack that targeted Iran’s nuclear program. It turns out to have been an inside job.

2019-09-09

Attacks On Hong Kong Protesters

An online forum used by demonstrators to organise mass rallies in Hong Kong has had servers hit by a large DDoS attack.

2019-09-09

The Digital Future Is About Disintegration

Electronic inter-connection is changing the way some people think about their identity, nationality and citizenship. By Alfred Rolington

2019-09-09

Why Cyber Training Is So Important For Business

A workforce trained in cybersecurity is the strongest weapon in any business’s arsenal when it comes to network resilience and data protection.

2019-09-06

French Cyber-Police, Avast & FBI Neutralise Global Botnet

French cyber police in the C3N cybercrime unit succeed in a very sophisticated piece of cyber intelligence, tracking, hacking and neutralisation.

2019-09-06

Cybersecurity Training And Jobs

Cybersecurity is a brilliant career path, whether you're technical or not. Salaries are rising and by 2022 there will be 100,000 UK job vacancies.

2019-09-05

NATO Will Retaliate

Cyberspace is the new battleground and making NATO cyber ready, well-resourced, well-trained, and well-equipped to fight back, is a top priority.

2019-09-04

A New Era Of Malware

NotPetya has ushered in a new era of implant-enabled malware where public opinion is as much the target as traditional IT systems.

2019-09-03

Proactivity Is Key To Effective Cybersecurity

Decision-makers need to plan for the worst and know what to do when an incident occurs.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Hack Miami

Hack Miami

HackMiami is the premier resource in South Florida for highly skilled hackers that specialize in vulnerability analysis, penetration testing, digital forensics, and all manner of IT security.

Centre for Secure Information Technologies (CSIT)

Centre for Secure Information Technologies (CSIT)

CSIT is a UK Innovation and Knowledge Centre (IKC) for secure information technologies. Our vision is to be a global innovation hub for cyber security.

Vera Security

Vera Security

Vera is a data security platform that provides 360-degree visibility and control over critical business data, anywhere it's shared or stored.

Atos

Atos

Atos provides a unique Cyber Security end to end solution with a data-centric and pre-emptive security approach.

Deutsche Cyber-Sicherheitsorganisation (DCSO)

Deutsche Cyber-Sicherheitsorganisation (DCSO)

DCSO is an IT security specialist with a focus in three areas - technology management, managed security services, security consulting and auditing.

Alan Boswell Group

Alan Boswell Group

We are a Group of Companies providing specialist Insurance Broking and Risk Management advice and services including Cyber Risk cover.

Infowhiz solutions

Infowhiz solutions

Infowhiz provides solutions for backup/disaster recovery and network security.

Cyjax

Cyjax

Cyjax monitors the Internet to identify the digital risks to your organisation, including cyber threats, reputational risks and the Darknet.

Arab Information & Communication Technologies Organization (AICTO)

Arab Information & Communication Technologies Organization (AICTO)

The Arab ICT Organization (AICTO) is an Arab governmental organization working under the aegis of the league of Arab States.

Aptiv

Aptiv

Aptiv is a global technology company that develops safer, greener and more connected solutions enabling the future of mobility.

EVOKE

EVOKE

EVOKE is an award-winning Digital Transformation company that partners with its clients to build digital workplace solutions for organizational challenges.

Boeing

Boeing

Boeing is the world's largest aerospace company and leading manufacturer of commercial jetliners, defense, space and security systems.

Cyber Security Works (CSW)

Cyber Security Works (CSW)

Cyber Security Works is your organization’s early cybersecurity warning system to help prevent attacks before they happen.

Mage Data

Mage Data

Mage (formerly Mentis Software) is a leading solutions provider for data security and data privacy software for global enterprises.

Cyber Risk International

Cyber Risk International

Cyber Risk International offer CyberPrism, a B2B SaaS solution that empowers businesses to perform a self-assessment of their cyber security program.

Gogolook

Gogolook

Gogolook is a leading TrustTech company. With "Build for Trust" as its core value, it aims to create an AI- and data-driven global anti-fraud network as well as Risk Management as a Service.