FREE TO VIEW


« Back to News

2019-04-03

Five Tech Trends Driving Cyber Security

Cybersecurity is an area where the best interests of business, customers and government need to align. A leading CISO identifies the key issues.

2019-04-03

British Cyber Security Strategy Is ‘Chaotic’

With cyber security responsibilities spread across six different departments, the UK government is coming in for biting criticism from its opponents.

2019-04-03

AI Is The New Route For Both Cyber Attacks And Their Prevention

AI is developing quickly and can be applied to several specific uses in cyber security. How useful is the technology and where can it be applied?

2019-04-02

How Can Boardrooms Effectively Manage Cyber Risk?

For too long, cyber security standards and best-practice have been targeting technical and operational levels, too complex for boards to grasp.

2019-04-02

New Zealand Reconsiders Mass Surveillance

After the mass murders in Christchurch, NZ politicians are talking about resuming a wide ranging mass surveillance program.

2019-04-02

Facebook Removes Suspicious Accounts For 'inauthentic behavior'

Facebook responds to critics by removing accounts in Iran, Russia, Macedonia & Kosovo demonstrating coordinated suspicious behavior.

2019-03-30

Security Flaw Puts UK Bank Customers At Risk

RBS customers have been put at risk of cyber-attack after being recommended flawed security software by the bank.

2019-04-01

Company Directors Must Become Cyber Aware

The UK is home to world leading businesses but the threat of cyber-attacks is always present. Business leaders must do more to reduce their risk.

2019-04-01

Ukraine Battles To Combat Election Hackers

The outcome of elections in Ukraine could hang in the balance if previous attacks by Russian hackers are successfully repeated.

2019-04-01

Quantum Computing Will Break Encryption

Modern public-key encryption techniques will soon be challenged by rapid advances in Quantum computing.

2019-03-29

Combining AI’s Power With Self-Centered Human Nature Could Be Dangerous

Its is not safe to think that as AI develops it will become more human-like.The reality is likely to be far more disconcerting and incomprehensible.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Threatpost

Threatpost

Threatpost, is an independent news site which is a leading source of information about IT and business security.

Cyber Security Academy - University of Southampton

Cyber Security Academy - University of Southampton

An industry/University partnership established to advance cyber security through world class research, teaching excellence, industrial expertise and training capacity.

Steptoe & Johnson

Steptoe & Johnson

Steptoe is an international law firm with offices in the USA, Europe and China. Practice areas include Cybersecurity, Privacy & National Security.

Sepio Cyber

Sepio Cyber

Sepio is the leading asset risk management platform that operates on asset existence rather than activity.

Air Informatics

Air Informatics

Air Informatics LLC provides security, information management, analytics and informatics for IT and wirelessly enabled airplanes and operations.

Sothis

Sothis

Sothis is an information technology services company offering a range of solutions including cybersecurity, managed security services, information governance and compliance.

Bitbone

Bitbone

Bitbone develop IT infrastructure and IT security solutions that create long-term value.

Intracom Telecom

Intracom Telecom

Intracom Telecom is a global telecommunication systems & solutions vendor offering a complete range of professional services and solutions including Information Security.

Venustech

Venustech

Venustech is a leading provider of network security products, trusted security management platforms, specialized security services and solutions.

TechBase

TechBase

TechBase is an innovation and start-up center offering technology-oriented start-ups optimal conditions for successful business development.

Torq

Torq

Torq's no-code automation modernizes how security & operations teams work with easy workflow building, limitless integrations and numerous pre-built templates.

Green Radar

Green Radar

Green Radar is a next generation cybersecurity company which combines technologies and services together to deliver Threat Detection for Emails and Deep Threat Analytics and Response.

Red Goat Cyber Security

Red Goat Cyber Security

Red Goat Cyber Security have created excellent, informative and interactive Social Engineering Awareness training which is suitable for all levels of staff.

Swish Data Corp.

Swish Data Corp.

Swish delivers when the problems are complex, requirements are difficult, and the mission is absolutely critical.

Aceiss

Aceiss

Aceiss empowers access security, providing unprecedented visibility and insights into user access.

Brunswick Group

Brunswick Group

Brunswick is a critical issues firm. We advise the world’s leading companies on how to navigate the critical issues they face and engage with their critical stakeholders.