FREE TO VIEW


« Back to News

2019-02-25

Lack Of Tech Expertise At Board Level Puts Strategy At Risk

Boards lack the expertise to fully understand the challenges and opportunities that data and technology present to their organisations.

2019-02-25

Hidden Truth About Cyber-Crime: Insider Threats

Malware is not the main cause of data loss. In fact, phishing, privilege breaches and compromised passwords are far more prevalent.

2019-02-20

Obsessive Web Browsing Linked To Depression

A large-scale academic study discovers a link between spending a lot of time browsing the Internet and depressive symptoms.

2019-02-22

Will Blockchain Change the World?

There have been many claims about the potential of Blockchain. Here are some basic concepts to help understand what it is and where it is going.

2019-02-22

The US Pentagon Is Speeding-Up Its Cloud Strategy

The US Defense Department has released its new cloud strategy, laying out the pathway for military adoption of cloud technology.

2019-02-19

Russia May Disconnect From The Internet

Russia wants the capability to isolate its own internet from the rest of the world and is testing the ways to insulate its networks from external access.

2019-02-18

China Accused Of A Cyber-Attack On Australia's Parliament

Australia's security agencies are investigating a breach of their Parliament's computer network suspected to be a foreign government attack.

2019-02-18

Chinese Hackers Go After Norwegian Businesses

Chinese hackers APT10 have stolen data from a Norwegian cloud software security company, according to experts at Recorded Future & Rapid7.

2019-02-15

British Government Funds Academic Research In Cybersecurity

Researchers based in UK academic institutions can apply for a share of up to £800,000 to support them in commercialising cyber security innovation.

2019-02-19

Cloud Based Technology For Policing

Cloud-based technology can be an effective tool helping law enforcement modernise work practices and better respond to changing societal issues.

2019-02-18

Children Need A Break

Mobile phones should be banned from the dinner table and bedtimes as part of a healthy approach to devices, says the UK's chief medical officers.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NextPlane

NextPlane

NextPlane provide secure real-time B2B unified communication and collaboration solutions within and across business systems.

Serena

Serena

Serena Software helps increase speed of the software development lifecycle while enhancing security, compliance, and performance.

British Assessment Bureau

British Assessment Bureau

The British Assessment Bureau is an ISO certification body. We check conformity and compliance of companies to recognised ISO standards including ISO 27001.

KELA

KELA

KELA's powerful cybercrime intelligence platform uncovers and neutralizes the most relevant cybersecurity threats coming from the hardest-to-reach places on the internet.

ARC Advisory Group

ARC Advisory Group

ARC is a leading technology research and advisory firm with expertise in both information technologies (IT) and operational technologies (OT)

Thinklogical

Thinklogical

Thinklogical manufactures secure, KVM, video, audio, and computer peripheral signal switching solutions for defence C4ISR applications.

ESTsoft

ESTsoft

ESTsoft Securedisk is an enterprise-wide file security solution that stores and manages all data in a central file server.

Wotan Monitoring

Wotan Monitoring

Wotan Monitoring is the software solution for fully automatic process monitoring, infrastructure monitoring and end-to-end monitoring.

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC) is a government body providing support for ICT related activities including formulating national ICT strategy and policy.

Gulf Computer Services Co (GCSC)

Gulf Computer Services Co (GCSC)

Gulf Computer Services is a major player in the field of networking & Communication solutions for emerging industries such as Internet Services and Information Technology in Saudi Arabia.

e.Kraal Innovation Hub

e.Kraal Innovation Hub

e.Kraal is a Cybersecurity Innovation Hub whose mission is to secure the future of Cybersecurity in Kenya by accelerating innovation and creativity in the cyberspace ecosystem.

Accel

Accel

Accel is a leading venture capital firm that invests in people and their companies from the earliest days through all phases of private company growth. Areas of focus include cybersecurity.

Trust Stamp

Trust Stamp

Trust Stamp provide Identity and Trust as a Service to answer two fundamental questions: “Who are you?” and “Do I trust you?"

Datrix

Datrix

Datrix is a leading Smart Infrastructure and Cyber Security solutions provider. We deliver critical networking, communications and cyber security solutions to public and private sector organisations.

DAtAnchor

DAtAnchor

Anchor is simply a better way to protect and control sensitive data. Zero-trust, data-centric security. Simplified.

Cydea

Cydea

Cydea are an optimistic cyber security consultancy of experts in security, data, technology and design that want to build a safer, more secure world where more things go right.