FREE TO VIEW


« Back to News

2019-08-14

Webinar: How to Build a Threat Detection Strategy in AWS

22nd August: Join SANS and AWS Marketplace to gain insights into creating a threat detection strategy for your cloud workloads.

2019-08-14

Training Robots & Human Bias

Robotic development is creating computer systems which can substitute and replicate both human actions and human fallibility.

2019-08-14

N. Korea’s Hackers Stole $2b To Fund Its Missile Program

Money stolen from foreign financial institutions by cyber-attacks is now being spent on North Korea's frightening nuclear weapons build-up.

2019-08-14

Microsoft Say The IoT Is Under Attack

One of Russia's elite state-sponsored hacking groups is going after IoT devices as a way to breach corporate networks.

2018-10-05

Russian Agents Are Behind Many Recent Attacks

The British NCSC says that the Russian GRU intelligence agency has long been carrying out widespread 'false flag' cyber attacks.

2019-08-13

Shockwave - A Global Transformation In Warfare

An electronic revolution is happening far quicker than previous revolutions and will significantly change the nature of warfare. By Alfred Rolington

2019-08-13

Cyber Security Jobs & The Skills Gap

IT and Cyber professionals with the requisite knowledge and skills are highly sought after. How can you navigate a new career in cyber security?

2019-08-13

Is The Cloud Skills Gap A Problem?

A lack of talent and skills in the IT sector is a big problem for business. For example, the transition to the cloud, which is now mainstream technology.

2019-08-12

Bank Creates Its Own AI To Identify & Disintegrate Malware

JPMorgan Chase is integrating Artificial Intelligence into its internal security systems to thwart malware infections within its own networks.

2019-08-12

US National Security Agency’s Cyber Offensive

The NSA is forming a new directorate to more closely align the agency’s offensive and defensive operations and to become more aggressive.

2019-08-12

UK Power Outage - The Cyber Effect?

Blackout: Cities, towns, hospitals and transport networks across England and Wales lost electrical power, affecting around 1m UK citizens.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Janusnet

Janusnet

Janusnet develops software and solutions for organisations to enforce and manage data security.

Zerto

Zerto

Zerto provides enterprise-class disaster recovery and business continuity software specifically for virtualized data centers and cloud environments.

Resilient Information Systems Security (RISS)

Resilient Information Systems Security (RISS)

RISS is a research group is in the Department of Computing at Imperial College London.

Graphus

Graphus

Graphus provides a simple, powerful, automated solution that eliminates 99% of social engineering and spear phishing attacks against G Suite business Gmail users.

Cybrary

Cybrary

Cybrary is an open-source cyber security and IT learning and certification preparation platform.

CSIRT-CY

CSIRT-CY

CSIRT-CY is the National Computer Security Incident Response Team for Cyprus.

ERI

ERI

ERI is the largest fully integrated IT and electronics asset disposition provider and cybersecurity-focused hardware destruction company in the United States.

SIA Group

SIA Group

SIA Group, an Indra company, combines Consulting, Systems Integration and Managed Services in four specialized business areas: Information Security, Storage, IT Management and IT Mobility.

MailChannels

MailChannels

MailChannels protects companies against malicious email threats. Used by 750+ hosting providers around the world.

Cognilytica

Cognilytica

Cognilytica’s Cognitive Project Management for AI (CPMAI) training and certification is recognized around the world as the best practices methodology for implementing successful AI & ML projects.

Akto

Akto

Akto, the plug & play API security platform. Discover your APIs, run tests and find business logic vulnerabilities at ludicrous speed.

Serbus

Serbus

Serbus Secure is a fully managed suite of secure communication, enterprise mobility and mobile device security tools.

Sev1Tech

Sev1Tech

Sev1Tech is a leading provider of IT modernization, cloud, cybersecurity, engineering, fielding, training, and program support services.

Indevtech

Indevtech

Indevtech has been serving Hawaii since 2001, providing end-to-end managed IT services to small- and medium-businesses.

Cyber & Data Protection

Cyber & Data Protection

Cyber & Data Protection Limited supports Charities, Educational Trusts and Private Schools, Hospitality and Legal organisations by keeping their data secure and usable.

Two99

Two99

Two99 provide tailored excellence in the areas of E-Commerce, Marketing, Consulting, and Cyber Security.