FREE TO VIEW


« Back to News

2019-06-06

Cyber Breaches Will Kill

Cars, appliances, power plants & medical devices are all at risk from hacking. In a world of "smart" devices that means the Internet can kill people.

2019-06-06

The Worldwide Skills Shortage Is Growing

The shortage of cyber security professionals puts organisations at risk and this is the No. 1 concern among those who already work in the field.

2019-06-06

Blockchain Can Improve Cyber Security

Blockchain tech offers one of the most effective tools to protect data from fraud and theft. It does this by complicating the work of hackers.

2019-05-22

Huawei Offers A 'No-Spy' Agreement

Bending to multinational pressure, Huawei's chairman say he's "willing to sign no-spy agreements with governments", including the UK.

2019-05-22

Five Tech Giants Promise To Stop Terrorist Content

Facebook, Amazon, Google, Twitter and Microsoft agree to develop shared tools to detect and remove terrorist or extremist content.

2019-06-06

Big-Data Analytics Risks Becoming Jammed

Big data Analytics are becoming core for almost any activity in the business, government, and security sectors.But is there just too much data?

2019-05-29

Is The US Planning A Cyber Attack On Iran?

A pre-emptive cyber-attack could be be a way for the US to hit Iran, without the need for attacks using conventional forces.

2019-06-06

Cyber Command Knows Its Tools Can Also Be Used By Their Targets

US Cyber Command leaders understand that the cyber weapons that they have made to attack their enemies might also be turned against them.

2019-06-06

Two Years After WannaCry Severe Risks Remain

A single vulnerable and an internet-exposed system was enough to wreak havoc, yet with over a million devices still unpatched, the risks remain.

2019-06-05

Digital Advertising Is A $Billion Ripoff

Internet advertising revenues are booming, worth over $100 billion in the US alone, but lying behind this is a hotbed of malware and fraud.

2019-06-05

A Predictive Tool For Armed Police

Police will soon be able to use behavioral data and get warning signs that an armed police officer may be about to go off the rails.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Celestix Networks

Celestix Networks

Celestix is a global provider of secure network solutions that enable the simple deployment of secure remote access connectivity.

Fenror7

Fenror7

Fenror7 lowers the TTD (Time To Detection) of hackers, malwares and APTs in enterprises and organizations from 300 days on average to 24 hrs or less.

Neupart

Neupart

Neupart provides Information Security Management System, Secure ISMS, allowing organisations to automate IT Governance, Risk and Compliance management.

Cyber Base

Cyber Base

Cyber Base is an Information Technology company based in Uganda providing software and hardware solutions to clients.

AAROH

AAROH

AAROH helps customers in Government, Law Enforcement, and Enterprises to identify, prevent, detect, resolve and protect from threats, crimes, breaches & fraud.

Pluribus One

Pluribus One

Pluribus One develops customized solutions and other data-driven applications to secure your business and your devices.

Slovenska Akreditacija (SA)

Slovenska Akreditacija (SA)

Slovenska Akreditacija is the national accreditation body for Slovenia. The directory of members provides details of organisations offering certification services for ISO 27001.

Salient Law

Salient Law

Salient Law is a virtual law firm that specialises in advising providers and users of technology on contracts involving technology.

Africa ICS Cyber Security Conference

Africa ICS Cyber Security Conference

Africa's largest ICS Cyber Security Conference and Expo. The only platform that will proudly present top level B2B and B2C networking opportunities.

Perch Security

Perch Security

Perch is a co-managed threat detection and response platform backed by an in-house Security Operations Center (SOC).

Dynics

Dynics

The Dynics ICS-Defender is an Industrial Control System Security Appliance for OT or OT/IT convergent environments.

US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber Command is responsible for Navy information network operations, offensive and defensive cyberspace operations, space operations and signals intelligence.

Fortify 24/7

Fortify 24/7

Fortify 24×7 provides a robust portfolio of managed cybersecurity solutions to help you identify and prevent attacks.

C3.ai Digital Transformation Institute

C3.ai Digital Transformation Institute

The C3.ai Digital Transformation Institute is a research consortium dedicated to accelerating the benefits of artificial intelligence for business, government, and society.

Entara

Entara

Entara (formerly YJT Solutions) is an eXtended Service Provider (XSP) focused on providing cutting edge technology and cyber security solutions to companies in regulated industries.

Fusion Cyber

Fusion Cyber

Fusion Cyber educates students in Zero Trust Risk Management, Defense, and Cyber Offense that lead to taking industry-accepted cybersecurity certifications.