FREE TO VIEW


« Back to News

2019-02-07

Pentagon Cybersecurity is Falling Behind

The US military’s cybersecurity capabilities aren’t advancing fast enough to stay ahead of an “onslaught of multipronged” attacks.

2019-02-08

Blockchain Improves Multicloud Network Management

Companies struggle to manage complex existing networks and multiple clouds as well as the associated security strains. Blockchain can help.

2019-02-07

Going Postal: ‘We Have Sent You a Message’

Don't be fooled by the latest email fraud campaign pretending to be from the US Postal Service and aimed at infecting your computer with malware.

2019-02-06

President Putin Wants A National AI Strategy

President Putin wants to build a national strategy for artificial intelligence as a critical tool for future economic and military power.

2019-02-06

N. Korea Could Expand Cyber Espionage Activities

In response to the stifling effects of international sanctions, N Korea's hackers could become more important to the regime than ever before.

2019-02-05

Britain Aims To Lead In CyberSecurity

The UK is investing £70m from its industrial strategy fund for new hardware to speed up the race to eradicate damaging cybersecurity threats.

2019-02-05

AI Based Security Analytics Is Growing Fast

The AI-based security analytics and threat intelligence platform RANK Software more than doubled its business last year. What's next?

2019-02-05

The Biter Bit: Secret Russian Files Are Leaked

The transparency advocacy group DDoSecrets has released 175 gigabytes of hacked Russian documents detailing the 'dark side' of the Kremlin.

2019-02-07

No Brexit Deal? Then Its ‘Digital Dover’

What will happen to UK digital activities - from search and display advertising through to online publishing and e-commerce - with no Brexit deal?

2019-02-04

AI In Business: 2019 Trends & Predictions

While robots will be taking over the workplace, some experts are predicting that it will actually improve and create new jobs for people.

2019-02-01

Geo-Political Tensions Are Fuelling Cyber Attacks

Carbon Black's latest Threat Report reveals just how sophisticated attackers have become in evolving to remain undetected.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Security Weekly

Security Weekly

Security Weekly provides free content within the subject areas of IT security news, vulnerabilities, hacking, and research.

Charlton Networks

Charlton Networks

Charlton Networks provide a complete range of IT infrastructure, network and security solutions aimed at SME companies.

Glasswall Solutions

Glasswall Solutions

Glasswall Solutions has developed a disruptive, innovative security technology which provides unique protection against document based cyber threats.

Trusted Knight

Trusted Knight

Trusted Knight is a leading provider of security software solutions focused on defeating newly developed malware and crimeware trojans.

National Forensic Sciences University (NFSU)

National Forensic Sciences University (NFSU)

National Forensic Sciences University is the world’s first and only University dedicated to Digital Forensic and allied Sciences.

Asia Data Destruction (ADD)

Asia Data Destruction (ADD)

ADD is the leading IT Assets Disposal and Data Destruction Company in Thailand.

Google for Startups

Google for Startups

Google for Startups is Google’s initiative to help startups thrive across every corner of the world.

OffSec

OffSec

OffSec have defined the standard of excellence in penetration testing training. Elite security instructors teach our intense training scenarios and exceptional course material.

Dynics

Dynics

The Dynics ICS-Defender is an Industrial Control System Security Appliance for OT or OT/IT convergent environments.

Kainos

Kainos

Kainos is a leading provider of Digital Services and Platforms. Our services include Digital Transformation, Cyber Security, Cloud, AI, IoT and more.

Packetlabs

Packetlabs

Packetlabs specializes in penetration testing services and application security.

Cubro Network Visibility

Cubro Network Visibility

Cubro network visibility solutions remove network monitoring ‘blind spots’ to provide enhanced visibility and control of all data transiting a company’s network.

Guernsey

Guernsey

Guernsey provides a wide range of engineering, architecture and consulting services to multiple markets, including cybersecurity consulting and CMMC certification.

OpsHelm

OpsHelm

OpsHelm provides a Software-as-a-Service solution to help businesses ensure that all of their cloud environments have their security bases covered.

Aura Information Security

Aura Information Security

Aura Information Security consists of a team of highly-skilled and renowned information security professionals spanning Australia and New Zealand.

Emircom

Emircom

Emircom is one of the Middle East's leading independent providers of IT infrastructure services, helping clients to drive growth and deliver measurable outcomes.