FREE TO VIEW


« Back to News

2019-08-16

Airlines Think Biometrics Will Improve Passengers' Experience

Star Alliance are working on a biometric data-based identification platform for frequent flyer program customers of member airlines.

2019-08-16

United Nations Investigating N Korean Cyber Attacks

S. Korea was hard hit by ten attacks by N. Korean hackers. India had three, Bangladesh and Chile were hit by three attacks plus 13 more countries.

2019-08-14

Webinar: How to Build a Threat Detection Strategy in AWS

22nd August: Join SANS and AWS Marketplace to gain insights into creating a threat detection strategy for your cloud workloads.

2019-08-14

Training Robots & Human Bias

Robotic development is creating computer systems which can substitute and replicate both human actions and human fallibility.

2019-08-14

N. Korea’s Hackers Stole $2b To Fund Its Missile Program

Money stolen from foreign financial institutions by cyber-attacks is now being spent on North Korea's frightening nuclear weapons build-up.

2019-08-14

Microsoft Say The IoT Is Under Attack

One of Russia's elite state-sponsored hacking groups is going after IoT devices as a way to breach corporate networks.

2018-10-05

Russian Agents Are Behind Many Recent Attacks

The British NCSC says that the Russian GRU intelligence agency has long been carrying out widespread 'false flag' cyber attacks.

2019-08-13

Shockwave - A Global Transformation In Warfare

An electronic revolution is happening far quicker than previous revolutions and will significantly change the nature of warfare. By Alfred Rolington

2019-08-13

Cyber Security Jobs & The Skills Gap

IT and Cyber professionals with the requisite knowledge and skills are highly sought after. How can you navigate a new career in cyber security?

2019-08-13

Is The Cloud Skills Gap A Problem?

A lack of talent and skills in the IT sector is a big problem for business. For example, the transition to the cloud, which is now mainstream technology.

2019-08-12

Bank Creates Its Own AI To Identify & Disintegrate Malware

JPMorgan Chase is integrating Artificial Intelligence into its internal security systems to thwart malware infections within its own networks.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ACIS Professional Center

ACIS Professional Center

ACIS provides training and consulting services in the area of information technology, cybersecurity, IT Governance, IT Service management, information security and business continuity management.

Satisnet

Satisnet

Satisnet is a leading Security Reseller, Managed Security Services Provider (MSSP) and Cyber Training Innovator, with operations throughout the UK, EMEA and United States.

Tripwire

Tripwire

Tripwire are a leading provider of risk-based security, compliance and vulnerability management solutions.

Tresorit

Tresorit

Tresorit helps teams to collaborate securely and easily by protecting their data with end-to-end encryption.

Certus Software

Certus Software

Our Secure Data Erasure solutions protect customer data confidentiality by completely erasing it from data storage devices.

Forensic Pathways

Forensic Pathways

Forensic Pathways focus on the provision of digital forensic technologies, offering clients unique technologies in the management of mobile phone data, image analysis and ballistics analysis.

Digittrade

Digittrade

Digittrade develop and produce external encrypted hard disks and secure communications apps.

Liongard

Liongard

Liongard automates the management and protection of modern IT environments at scale for IT MSPs - Managed Service Providers and Enterprise IT Operations.

Havoc Shield

Havoc Shield

Havoc Shield is an all-in-one information security platform that includes everything a growing team needs to secure their remote workforce.

Network Utilities (NetUtils)

Network Utilities (NetUtils)

Network Utilities provide identity centric network and security solutions to organisations from Telecoms and ISPs to SMEs and large corporates.

ENSCO

ENSCO

The ENSCO group of companies provides engineering, science and advanced technology solutions that guarantee mission success, safety and security to governments and private industries worldwide.

SRG Security Resource Group

SRG Security Resource Group

SRG Security Resource Group is a Canadian company dedicated to providing world-class Physical and Cyber Security services.

SGTech

SGTech

SGTech is the leading trade association for Singapore's tech industry, offering focused support and development to both strategic and emerging sectors in the industry.

DC Two

DC Two

DC Two are a locally operated and supported Australian data centre, offering a suite of vertically integrated services covering every part of the data centre and cloud technology stack.

StrongBox IT

StrongBox IT

Strongbox IT provides solutions to secure web applications and infrastructure.

Memcyco

Memcyco

Memcyco is a provider of cutting-edge digital trust technologies to empower brands in combating online brand impersonation fraud, and preventing fraud damages to businesses and their clients.