FREE TO VIEW


« Back to News

2019-02-25

Zuckerberg Has Failed

Facebook needs far-stricter regulation, with tough and urgent action necessary to end the spread of disinformation on its platform, say British MPs.

2019-03-07

What Is Data Fusion?

Big Data is all around us, in every field of life. But in spite of the far-reaching advantages, obvious clues frequently hide in a sea of unrelated data.

2019-03-06

Cyber Security Pros Are Feeling The Pressure

A major study carried out by Nominet reveals the heavy workload and budgetary problems that are having a physical effect on cybersecurity leaders.

2019-03-06

Blockchain’s Newest Application Is Civil Aviation

Blockchain networks and smart contracts can help mitigate some of the most difficult security issues in the aviation industry.

2019-03-06

Cyber Command’s Plan to ‘frustrate’ Hackers Is Working

Defend Forward: US cyber soldiers have found ways to let foreign nation-state hackers know they are being watched and can be intercepted.

2019-03-05

Four Ways That Fake-News Sites Trick People

Fake-news sites are successful because many people believe and then share their false reports. How can social media users avoid being misled?

2019-02-20

Take An Analytical Approach To Cybersecurity Training

There are many solutions designed to protect businesses from just about any security threat, yet an enterprise's biggest weakness is its people.

2019-03-05

Dating Sites Fraudster Alert

Romance fraudsters target lonely hearts using dating sites. Not only will they steal your heart, they will steal your money and your identification.

2019-02-20

Russian Hacking Intensifies Closer To Ukrainian Election

Russian hackers are redoubling their efforts in the run-up to presidential elections in Ukraine, according to the head of Ukraine’s cyber-police.

2019-02-21

IoT Is In The Dark When It Comes To ePrivacy

As if GDPR wasn’t enough of a challenge, the new ePrivacy regulation is set to shake things up massively when it comes to the Internet of Things.

2019-03-05

Edward Snowden Likes Zcash

Unbothered by the repressive regime where he lives in Moscow, Edward Snowden has expressed support for a controversial new cryptocurrency.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Securosis

Securosis

Securosis is an information security research and advisory firm dedicated to improving the practice of information security.

Chatham House

Chatham House

Chatham House is an independent policy institute based in London. Topics cover foreign affairs and defence including cyber security.

DLA Piper

DLA Piper

DLA Piper is a global law firm with offices throughout the Americas, Asia Pacific, Europe and the Middle East. Practice areas include Cybersecurity.

Brinqa

Brinqa

Brinqa is a leading provider of unified risk management and security analytics.to manage IT governance and technology risk.

Bericon Forensics

Bericon Forensics

Bericon is one of the longest established forensic science consultancies in the UK. Activities include computer and mobile phone forensics.

Exida

Exida

Exida is a leading product certification and knowledge company specializing in industrial automation system safety, security, and availability.

Relution

Relution

Relution is the Unified Endpoint Management platform for innovative companies and educational institutions. It enables you to manage your mobile apps and devices easily and securely.

SGBox

SGBox

SGBox is a highly flexible and scalable solution for IT security. Choose the modules which your company needs and implement it without any modification to your network infrastructure.

North European Cybersecurity Cluster (NECC)

North European Cybersecurity Cluster (NECC)

NECC promotes information security and cybersecurity-related cooperation and collaboration in the Northern European region in order to enhance integration into the European Digital Single Market.

European Cyber Security Conference

European Cyber Security Conference

EU Cyber Security Conference will debate what Europe’s response to evolving threats in a dynamic global risk landscape should look like and what the next steps for all actors of the ecosystem.

DataDog

DataDog

DataDog provides Cloud-native Security Monitoring. Real-time threat detection across your applications, network, and infrastructure.

WhizHack Technologies

WhizHack Technologies

WhizHack's mission is to not only create a pipeline of cyber security products but also to empower people to sustainable innovation in securing digital assets of tomorrow.

Ermes

Ermes

Ermes – Intelligent Web Protection provides companies with a solution that effectively secures them against web threats.

SecureTeam

SecureTeam

SecureTeam are a UK-based information security practice, specialising in all areas of cybersecurity.

Geobridge

Geobridge

Geobridge was one of the first information security solutions providers to support cryptography and payment applications for payment processors, financial institutions and retail organizations.

Relatech

Relatech

Relatech is a Digital Enabler Solution Knowledge (D.E.S.K.) Company that offers digital services and solutions dedicated to the digital transformation of businesses.