FREE TO VIEW


« Back to News

2018-07-16

Is Cyber The Perfect Weapon?

Millions of intrusions into other countries’ networks occur each year, but only a half-dozen or so have done actual significant physical harm.

2018-07-16

Russia Will Keep Up Cyber Attacks For Geo-Political Influence

Ukraine's intelligence chiefs are convinced Russia is committed to using de-stabilising cyber attacks as tools to extend its international influence.

2018-07-16

Coast Guard Academy Creates New Cybersystems Program

The U.S. Coast Guard Academy is now offering an academic program in cyber systems, its first major new initiative in a quarter century.

2018-07-13

Breakthrough Technologies To Combat Insider Threats

Advances in technology have a positive outlook on keeping sensitive data safe. Here are five emerging tools for mitigating insider threats.

2018-07-13

Fake News Is A Real Cybesecurity Risk

The viral nature of fake news does more than spread misinformation, it presents extensive cybersecurity risks that are not making the news.

2018-07-13

Are Women Better At Cyber Security?

The cybersecurity industry needs more analytical, curious and creative individuals. These prized qualities could be hidden in plain sight.

2018-07-12

Fake Dating Apps Infiltrate Israeli Military

Hamas has a sophisticated spyware operation designed to trick Israeli Defense Force soldiers into downloading malicious apps.

2018-07-11

HSBC Robots Aren't Bankers. Yet

The head of innovation for HSBC thinks a robot powered by machine learning could help the multinational bank transform retail banking.

2018-07-11

China Is Spying On Germany

Chinese agents actively networking with German MPs, offering them money and foreign travel in exchange for expertise and 'insider knowledge'.

2018-07-11

EU Creates A Unified Cyber-Force

EU member states have agreed to create “EU Cyber Rapid Response Force” teams and is enlisting support from all member states.

2018-07-11

ICO Fine Facebook Half A Million Pounds

Facebook is to be fined £500,000 by the British ICO regulator, the maximum amount possible, for its part in the Cambridge Analytica scandal.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Research Institute in Science of Cyber Security (RISCS)

Research Institute in Science of Cyber Security (RISCS)

RISCS is focused on giving organisations more evidence, to allow them to make better decisions, aiding to the development of cybersecurity as a science.

Wibu-Systems

Wibu-Systems

Wibu-Systems is a leading provider of solutions for the Digital Rights Management (DRM) and anti-piracy industry.

Cyberia Group

Cyberia Group

Cyberia is a leading Internet and Security services provider with operations in Saudi Arabia, Lebanon and Jordan.

Protectimus

Protectimus

Affordable two factor authentication (2FA) provider. Protect your data from theft with multi factor authentication service from Protectimus.

BigWeb Technologies

BigWeb Technologies

BigWeb Technologies is dedicated to provide its clients with ICT related services including Infrastructure Solutions, Consultancy and Security.

Approachable Certification

Approachable Certification

Approachable Certification is a UKAS accredited certification body offering down-to-earth and competitively priced audits against ISO Management Systems standards.

CyberSec Hub

CyberSec Hub

The goal of CyberSec Hub is to create a centre of excellence for cybersecurity in Krakow, a new European “Cyber-Silicon Valley”.

Sum&Substance (Sumsub)

Sum&Substance (Sumsub)

Sum&Substance is a developer of remote verification solutions. Our technology allows online services around the world to meet regulatory requirements, prevent fraud and enhance customer confidence.

Deepwatch

Deepwatch

deepwatch’s cloud SecOps platform and relentless customer focus are redefining the managed security services industry.

CliftonLarsonAllen (CLA)

CliftonLarsonAllen (CLA)

CLA exists to create opportunities for our clients through industry-focused advisory, outsourcing, audit, tax, and consulting services.

Clearnetwork

Clearnetwork

Clearnetwork specializes in managed cybersecurity solutions that enable both public and private organizations improve their security posture affordably.

MAUSHIELD

MAUSHIELD

MAUSHIELD is the national platform for sharing cyber threat information and intelligence that can help organisations to improve their cybersecurity posture, minimize risks and prevent cyber-attacks.

Maltego Technologies

Maltego Technologies

Maltego is a comprehensive tool for graphical link analyses that offers real-time data mining and information gathering. Applications include cybersecurity threat intelligence and incident response.

WPScan

WPScan

With WPScan, you'll be the first to know about vulnerabilities affecting your WordPress installation, plugins, and themes.

Radix Technologies

Radix Technologies

Radix offer end-to-end device management solutions, consolidating all the organization devices, processes and stakeholders into one easy-to-use management platform.

KTrust

KTrust

KTrust provides Continuous Threat Exposure Management for Kubernetes environments.