FREE TO VIEW


« Back to News

2018-07-10

California Passes Its Own GDPR Law

California's 40m residents get the right to view the data companies hold on them, make corrections and request that it not be sold to third parties.

2018-07-10

Five Tips To Secure IoT

To make the most of empowering IoT technology, it must be simultaneously optimised to do its job while not exposing personal data.

2018-07-10

Police Criticised For Face Recognition Failures

Face recognition is contentious because of issues of privacy and race. Some experts are saying face recognition software is not ready for Police use.

2018-07-09

Russia Faces US Request To Extradite Snowden

Donald Trump is expected to ask for Edwards Snowden's return to the US to face trial when he meets Vladimir Putin next week.

2018-07-09

Blockchain For US Border Security

DHS want to combine blockchain technology with US border sensors and cameras to protect the integrity of data collected by IoT devices.

2018-07-09

Crypto-Mining For Cyber Criminals

Malicious crypto-mining malware is becoming a top tactic among cyber criminals according to WatchGuard Security's Q1 threat intelligence update.

2018-07-07

Cybercrime & Terrorism Threaten South Africa

S Africa needs more advanced gadgets to detect early danger signals and its intelligence service needs more well-trained agents in the field.

2018-07-09

China Escalates Hacks On The US

Submarines, Satellites & More. China's nation state hackers have reorganized and retooled to become even more effective at digital espionage.

2018-07-06

Theft & Subsequent Re-Use of Cyber Weapons

A year has passed since two widespread and very destructive attacks, both using offensive cyber tools created by the NSA and then stolen.

2018-07-05

Using AI To Reduce Business Risks

The constant evolution of malware, ransomware and other threats makes detection with conventional cybersecurity protocols increasingly difficult.

2018-07-05

Can Russian Hackers Be Stopped?

Few companies can survive a sustained assault by hackers, even fewer are prepared to defend against state-backed attacks. Is there a deterrent?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: 2024 and beyond: Top six cloud security trends

ON-DEMAND WEBINAR: 2024 and beyond: Top six cloud security trends

Learn about the top cloud security trends in 2024 and beyond, along with solutions and controls you can implement as part of your security strategy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Finjan Holdings

Finjan Holdings

Finjan solutions are aimed at keeping the web, networks, and endpoints safe from malicious code and security threats.

Kramer Levin

Kramer Levin

Kramer Levin is a full-service law firm with offices in New York and Paris. Practice areas include Cybersecurity, Privacy and Data Protection.

Tukan IT

Tukan IT

Tukan IT provides a data classification and protection solution.

Cobalt Labs

Cobalt Labs

Pen Testing as a Service for Modern SaaS Businesses. Cobalt is redefining the modern pen test for companies who want serious hacker-like testing built into their development cycle.

The Cyber Security Expert

The Cyber Security Expert

The Cyber Security Expert delivers cyber security consultancy, website and cloud security monitoring services, and specialist training services.

XLAB

XLAB

XLAB is an R&D company with a strong research background in the fields of distributed systems, cloud computing, security and dependability of systems.

Scanmeter

Scanmeter

Scanmeter helps identifying vulnerabilities in software and systems before they can be exploited by an attacker.

ThreatGen

ThreatGen

ThreatGEN™ works with your team to improve your resiliency and industrial cybersecurity capabilities through an innovative and modernized approach to training and services.

SecZetta

SecZetta

SecZetta provides third-party identity risk solutions that are easy to use, and purpose built to help organizations execute risk-based identity access and lifecycle strategies.

GoVanguard

GoVanguard

GoVanguard is an boutique information security team delivering robust, business-focused information security solutions.

Future Planet Capital

Future Planet Capital

Future Planet is the impact-led, global venture capital firm built to invest in high growth potential companies from the world's top research centres.

Chartered Institute of Information Security (CIISec)

Chartered Institute of Information Security (CIISec)

CIISec is dedicated to helping individuals and organisations develop capability and competency in cyber security.

Purple Knight

Purple Knight

Purple Knight is a free Active Directory security assessment tool built and managed by an elite group of Microsoft identity experts.

Wavenet

Wavenet

Wavenet has grown from simple beginnings to become one of the UK’s market leaders in unified communications, business telephony, and Cyber Security solutions.

SEK Security Ecosystem Knowledge

SEK Security Ecosystem Knowledge

SEK helps companies in the complex path of cybersecurity; in the analysis, detection and prevention of digital threats.

OrbiSky Systems

OrbiSky Systems

OrbiSky Systems is a British tech startup specializing in data management and cybersecurity solutions.