FREE TO VIEW


« Back to News

2018-07-05

MSAB Joins CASE Initiative On Digital Forensics

MSAB has joined other industry leaders to work collaboratively on the Cyber-Investigation Analysis Standard Expression (CASE) initiative.

2018-07-04

The Five Most In-Demand Cybersecurity Roles

More companies are seeking cybersecurity professionals in efforts to comply with the EU's General Data Protection Regulation (GDPR).

2018-06-29

CyberPatriot Trains Kids To Protect America

CyberPatriot pits teams of middle and high school students against each other as they try to secure their computers against hackers and malware.

2018-07-04

US Builds The Fastest Supercomputer. For Now.

The arms race in computing power to drive AI and other complex data processes continues apace as 'Summit' leapfrogs 'Sunways TaihuLight'.

2018-07-04

How Cloud Computing Changes Data Governance Strategies

Whether on-premises, private, hybrid or multi-cloud, organisations getting the benefit of the cloud require an alternative data governance approach.

2018-07-04

What Does Blockchain Mean To The EU?

There are growing indications that the European Union is waking up to the vast potential offered by the technology.

2018-07-04

A Brief History Of Cyber-Deterrence

Since 2014 the pace of international cyberwar, hacking attack, counterattack and reprisal has been speeding up. Here is a timeline of events.

2018-07-03

Cryptocurrency Cybercrime Surging In The UK

Action Fraud warn of a wave of fake Wannacry ransomware attacks threatening users that their files will be deleted unless a Bitcoin fine is paid.

2018-07-03

Is GDPR Good For SME Data?

Small and midsize businesses face a unique set of challenges when addressing compliance with the EU’s General Data Protection Regulation.

2018-07-03

Inside The Chinese-Hacking Underground

The experts at Flashpoint know how to identify & characterise the exploits of Chinese hacking groups distinct from those of other nations.

2018-07-03

Trump Backs Russia On Election Interference

President Trump contradicts the US intelligence establishment's conclusions about Russian interference in the 2016 Presidential elections.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Certes Networks

Certes Networks

Certes Networks offers an encryption management solution that can be seamlessly integrated and is interoperable with any network.

Signal Sciences

Signal Sciences

Signal Sciences Web Protection Platform (WPP) provides comprehensive threat protection and security visibility for web applications, microservices, and APIs on any platform.

VMRay

VMRay

VMRay delivers advanced threat analysis and detection that combines a unique agentless hypervisor-based network sandbox with a real-time reputation engine.

Computer Forensic Services

Computer Forensic Services

Computer Forensic Services are digital evidence specialists. Practice areas include Information Security, e-Discovery, Law Enforcement Support and Litigation.

PRODAFT

PRODAFT

PRODAFT, Proactive Defense Against Future Threats, is a cyber security and cyber intelligence company providing solutions to commercial customers and government institutions.

Cyber Risk Opportunities

Cyber Risk Opportunities

Cyber Risk Opportunities was formed to enable middle-market executives to become more proficient cyber risk managers so their organizations can thrive.

WISeKey

WISeKey

WISeKey is a leading cybersecurity company currently deploying large scale digital identity ecosystems for people and objects using Blockchain, AI and IoT.

Africa ICS Cyber Security Conference

Africa ICS Cyber Security Conference

Africa's largest ICS Cyber Security Conference and Expo. The only platform that will proudly present top level B2B and B2C networking opportunities.

CYBRScore

CYBRScore

CYBRScore is a premium, performance-based cyber skills training and assessment provider that quantifies a user’s ability to defend a network.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Infostream

Infostream

Infostream is a leading integrator of Digital Transformations Solutions (DTS); Public, Private, and Hybrid Cloud; Cybersecurity; Data Integrity; DevOps, DevSecOps, and Infrastructures.

Gotham Digital Science (GDS)

Gotham Digital Science (GDS)

Gotham Digital Science is an international security services company specializing in Application and Network Infrastructure security, and Information Security Risk Management.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IBM Security

IBM Security

IBM manufactures and markets computer hardware, middleware and software, and offers hosting and consulting services in areas ranging from mainframe computers to nanotechnology.

Elba

Elba

Employee security needs to be reinvented. SaaS security needs to involve end-user and awareness needs to be actionable. Meet elba, the 5-in-one cybersecurity hub with no compromises.

IONIX

IONIX

IONIX is the attack surface management solution that uses Connective Intelligence to shine a spotlight on exploitable risks across your real attack surface and its digital supply chain.