FREE TO VIEW


« Back to News

2018-11-14

Why The Public Directory Of Domain Names Is About To Vanish

Until May 2018, anyone could look up the name and contact details for the owner of a domain name. Not any more. By Emily Taylor

2018-11-14

Can AI Be Used To Fight Crime?

AI is now sophisticated enough to offer police the tools to solve previous crimes while helping to prevent of crimes yet to take place. By Bill Hess

2018-11-15

Companies Are Dropping The Term ‘Blockchain’ Due To Hype

A new report states that some companies are stopping using the term “blockchain” because they think it is overhyped.

2018-11-20

What Is Blockchain Technology?

Blockchain technology, for all its merits, is not a new technology. Rather, it is a combination of proven technologies applied in a new way.

2018-11-13

How To Get Into Cyber Security: Tips, Strategy And Skills

According to the US Bureau of Labor Statistics, cyber security jobs are projected to grow 28% by 2026, a rate that far outpaces other careers.

2018-11-12

The UK Will Be Hit By A Category One Cyber-Attack

Britain has not yet faced what would be considered a ‘category one’ cyber-attack, but there is little doubt that it will happen.

2018-11-13

Five Questions CEOs Are Asking About AI

Although they believe AI’s value, many executives are still wondering about the best way to handle its adoption in their business.

2018-11-12

Edward Snowden Issues Surveillance Warning To Israelis

Speaking from Moscow, Edward Snowden has urged an Israeli audience to be on guard against heavy-handed government & private surveillance.

2018-11-09

Microsoft Wants To Work with Trump & Congress On Cybersecurity

Bipartisan: Despite a newly divided US Congress, Microsoft is looking for ways to create a global force-field against cybersecurity threats.

2018-11-09

USB Devices Pose A Significant Threat To Industrial Facilities

Removable USB media devices pose a significant and intentional cyber threat to a wide array of industrial process control networks.

2018-11-08

Iran Admits To Being Hit By Cyber Attack

Iran’s strategic infrastructure networks have reportedly come under an extensive and powerful cyber-attack. Who would do that?.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Team Cymru Research NFP

Team Cymru Research NFP

Team Cymru Research is a group of technologists passionate about making the Internet more secure and dedicated to that goal.

LogonBox Software

LogonBox Software

LogonBox Software specialises in producing a cost-effective range of Network Security and Identity Management software solutions for all sizes of Enterprise.

Cyber Security For Critical Assets (CS4CA)

Cyber Security For Critical Assets (CS4CA)

Cyber Security For Critical Assets is a global series of summits focusing on cyber security for critical infrastructure.

Appdome

Appdome

Appdome is the industry's first mobile integration as a service company, providing solutions for enterprise mobility and mobile application security.

Red Canary

Red Canary

Red Canary continuously monitors and analyzes your endpoints, users, and network activity in search of threatening behaviors, patterns, and signatures.

CIO Dive

CIO Dive

CIO Dive provides news and analysis for IT executives in areas including IT strategy, cloud computing, cyber security, big data, AI, software, infrastructure, dev ops and more.

Smarttech247

Smarttech247

Smarttech247 deliver a range of cyber security solutions, including cognitive security services using IBM Watson for Cybersecurity, SIEM, Compliance & Governance, and Penetration Testing.

CyberSAFE Malaysia

CyberSAFE Malaysia

CyberSAFE Malaysia is an initiative to educate and enhance the awareness of the general public on the technological and social issues and risks facing internet users.

YesWeHack

YesWeHack

YesWeHack offers companies an innovative approach to cybersecurity with Bug Bounty (pay-per-vulnerability discovered) to identify and report vulnerabilities in their systems.

Finosec

Finosec

Finosec's mission is to change the way information security and cybersecurity are managed in banking.

Kratos Defense & Security Solutions

Kratos Defense & Security Solutions

The Kratos Space, Training, and Cybersecurity division addresses key cybersecurity challenges, including cloud security, continuous monitoring, IT security, and risk management.

FPT Software

FPT Software

As a leading technology service provider, FPT assists customers of all sizes and from any industries in implementing and adapting digital technologies including cybersecurity.

7layers

7layers

7layers has established itself as one of the world’s leading test house groups for mobile devices and the growing number of wireless devices, modules and chipsets.

Appurity

Appurity

Appurity specialises in mobile and application security, delivering comprehensive solutions across all verticals.

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).

Aquia

Aquia

Aquia are on a mission to enable innovation and drive transformative change to solve the world’s most pressing and complex cybersecurity challenges.