FREE TO VIEW


« Back to News

2018-07-24

Hacking Via The Cloud

Chinese hackers launched a big 2017 espionage campaign targeting cloud service supplier’s networks, rather than attacking companies directly.

2018-07-23

China Dominates Global Investment In AI

Chinese investment and financing in AI technology accounts for 60 percent of the worldwide total, valued in 2017 at $27 billion.

2018-07-20

Snowden – Five Years Later

From safety in Moscow, Edward Snowden has no regrets five years on from leaking the biggest cache of top-secret documents in history.

2018-07-20

Big Data Becomes Everyone's Job

Once a responsibility reserved for IT and technical experts, Big Data is entering an era where everyone needs to use data in their own roles.

2018-07-20

Top Cyber Spy Warns Against AI

The Chief of the Australian Signals Directorate says spy agencies around the world are increasingly using AI to carry out covert activities.

2018-07-19

Get Ready For ePrivacy Regulation

Some thought GDPR was bad - ePrivacy Regulation is a new single digital data privacy framework for companies doing business in the EU.

2018-07-19

UK CEOs Believe Cyber Attacks Are Inevitable

KPMG surveyed 150 business leaders to find 40% of UK CEOs say it's no longer a case of "if" a cyber attack will happen as it is now an inevitability.

2018-07-19

Cybercrime Is A Real Economic Threat

Online scams and cybercrime have the potential to impose irreversible financial, legal and reputational costs. At least take basic precautions.

2018-07-18

Weaponising Stolen Data

A new frontier in cyber threats could be the illicit use of critical infrastructure to manipulate data to weaponise it in new and unexpected ways.

2018-07-18

The White House’s AI Committee's First Meeting

The high level group is charged with establishing partnerships between government, the private sector and independent researchers.

2018-07-18

A New Heavyweight Drone

The Sukhoi Aircraft Company is building a new multi-purpose heavy drone as a technology demonstrator to test new applications.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Quttera

Quttera

Quttera provides Website Security Solutions for Small & Medium Businesses, Enterprises and Organizations.

Cleafy

Cleafy

Cleafy protects web and mobile applications from tampering attempts and deploys countermeasures to guarantee data and content integrity at scale.

CONCERT

CONCERT

CONCERT is a Computer Emergency Response Team and cyber security information sharing network for companies, institutes and government in Korea.

SentinelOne

SentinelOne

SentinelOne is a pioneer in delivering autonomous security for the endpoint, datacenter and cloud environments to help organizations secure their assets with speed and simplicity.

PSW Group

PSW Group

PSW Group is a full-service Internet solutions provider with a special focus on Internet security.

ReSec Technologies

ReSec Technologies

ReSec provides total protection against all types of known and unknown malware threats including viruses, Trojans, ransomware and phishing, regardless of their delivery method.

Fraud.com

Fraud.com

Fraud.com ensures trust at every step of the customer's digital journey; this complete end-to-end protection delivers unified identity, authentication and fraud detection and prevention.

SYSGO

SYSGO

SYSGO is the leading European provider of real-time operating systems for critical embedded applications in the Internet of Things (IoT).

Orca Security

Orca Security

Orca Security delivers full stack visibility including prioritized alerts to vulnerabilities, compromises, misconfigurations, and more across your entire inventory on all your cloud accounts.

SecureLogix

SecureLogix

SecureLogix deliver a unified voice network security and call verification solution. Protect against call attacks & fraud.

Shevirah

Shevirah

Shevirah specializes in products for automated mobile and IoT device vulnerability assessment, penetration testing, and mobile security awareness training.

Redsquid

Redsquid

At Redsquid we are all about making a difference to our customers with the use of technology, as an innovative provider of solutions within IoT, Cyber security, ICT, Data Connectivity & Voice.

Grant Thornton

Grant Thornton

Grant Thornton is one of the world’s leading networks of independent assurance, tax and advisory firms.

Artifice Security

Artifice Security

Artifice Security will demonstrate real-world attacks on your network, web applications, infrastructure, and personnel to expose your hidden security risks.

Deutsche Gesellschaft für Cybersicherheit (DGC)

Deutsche Gesellschaft für Cybersicherheit (DGC)

As a leading provider of cyber security, DGC supports companies in taking advantage of the opportunities offered by the digital transformation – and in minimizing the associated risks.

Prikus Tech

Prikus Tech

Prikus is a full-fledged Cyber Security Company helping organizations worldwide to manage cyber risks. We offer Risk & Compliance Services, Security Testing & Managed Security Services.