FREE TO VIEW


« Back to News

2019-07-25

Cannabis Buyers Are Uniquely Vulnerable To Cyber Attacks

N. America’s emerging cannabis industry, along with many of its customers, could be especially vulnerable to hackers and extortion.

2019-07-25

Cyber Criminals Are Targeting Latin America

As S.American companies and governments race to embrace the Internet, cybersecurity and the related risks of cybercrime are being ignored.

2019-07-25

Most Organisations Lack Cyber Resilience

Forget About Protection: Most organisations lack even a clear idea of what their most critical information assets are or where they're located.

2019-07-24

From Ciphers To Cyber Security

One Hundred Years Of Spying: GCHQ celebrates transparency with an exhibition of documents, devices & appliances from the agency's history.

2019-07-24

Business Leaders Are Ignoring Cyber Risks

Cyber-attacks have cost British medium sized businesses with income between £15m and £1bn at least £30bn in the past year.

2019-07-23

Privacy: Can You Trust FaceApp With Your Face?

Smartphone software used to simulate the ravages of time upon users' features is at the centre of a global cybersecurity row over its Ts&Cs.

2019-07-22

Russian FSB Hacked: "Largest data breach in its history"

Hackers have successfully targeted Russia's Federal Security Service in possibly "the largest data leak in the history of Russian intelligence."

2019-07-23

The Destabilizing Danger Of Cyberattacks On Missile Systems

Attacks that aim to disable enemy missile systems may increase the chance of them being used, not least because the systems are so vulnerable.

2019-07-22

E-Fusion And Industry 4.0

Industry 4.0 is driven by a technological fusion that is blurring the lines between the physical, digital & biological spheres. By Alfred Rolington

2019-07-22

AI Could Transform Submarine Warfare

Applying AI to ocean data helps submarine crews understand where their adversaries are, what they’re doing and what they can see.

2019-07-19

SMEs Run Outdated & Vulnerable Operating Systems

Security weaknesses in SMEs include antiquated Microsoft operating systems, encryption defects, poor patching and outdated email servers.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Secret Double Octopus

Secret Double Octopus

Secret Double Octopus offers the world’s only keyless multi-shield authentication technology for users and things.

Inter-American Cooperation Portal on Cyber-Crime

Inter-American Cooperation Portal on Cyber-Crime

The Inter-American Cooperation Portal on Cyber-Crime was created to facilitate and streamline cooperation and information exchange among government experts from OAS member states.

Startup Wise Guys

Startup Wise Guys

Startup Wise Guys is a mentorship-driven accelerator program for early stage B2B SaaS, Fintech, Cybersecurity & Defense AI startups.

DreamIt Ventures

DreamIt Ventures

DreamIt Ventures is an early stage venture fund that accelerates startups building transformative tech products in the fields of Healthtech, Securetech, and Urbantech.

Billington CyberSecurity

Billington CyberSecurity

Billington CyberSecurity is a leading, independent education company with an exclusive focus on cybersecurity.

Militus

Militus

Militus provides the only information security service available that learns and analyzes your network over time using a custom-built network-based toolset.

Havoc Shield

Havoc Shield

Havoc Shield is an all-in-one information security platform that includes everything a growing team needs to secure their remote workforce.

Axis Security

Axis Security

Axis Security technologies transform open networks and vulnerable applications into fully protected resources that the business can trust.

Wiz

Wiz

Wiz - the first cloud visibility solution for enterprise security: A 360° view of security risks across clouds, containers and workloads.

SecureAge Technology

SecureAge Technology

We’re a rapidly growing cybersecurity company with an 18-year history of ZERO Data breaches. Our security solutions place security and usability on equal footing. Learn more about our technology.

Venustech

Venustech

Venustech is a leading provider of network security products, trusted security management platforms, specialized security services and solutions.

Orpheus Cyber

Orpheus Cyber

Orpheus Cyber provides predictive and actionable intelligence to our clients - enabling them to anticipate, prepare for and respond to the cyber threats they face.

Catalogic Software

Catalogic Software

Catalogic helps clients backup, recover, manage, and protect their data across their enterprise and cloud environments with Smart Data Protection solutions.

Radius Technologies

Radius Technologies

Radius Technologies is trusted by progressive SMEs to deliver world-class cloud, IT solutions, IT and data security, and telecoms systems.

Oduma Solutions

Oduma Solutions

Oduma Solutions is a wholly owned Ghanaian Cybersecurity company that offers information security services to organisations seeking to improve their security posture.

Virtual IT Group (VITG)

Virtual IT Group (VITG)

VITG is a cyber security-focused Managed Service Provider (MSP).