FREE TO VIEW


« Back to News

2017-03-24

Tomorrow's Smart Cities Will Be Data Driven

Over 70% of the world's population will live in urban areas by 2050 - but don't think that means you will be able to get lost in the crowd.

2017-03-23

Hack Headlines Cause Financial Damage

Many large companies would prefer to pay ransom to avoid public shaming & other devastating consequences of a security breach.

2017-03-22

HSBC Appoints A Technology Advisory Board

The banking giant wants to capitalise on opportunities in AI, biometrics, blockchain and data science, using its global reach to fight cybercrime.

2017-03-22

Healthcare Starts Spending Big On Cybersecurity

Healthcare organisations are increasing information security spending, reflecting a rapid transition to electronic records & data digitisation.

2017-03-22

New Malware Hides In Memory

DNSMessenger: Researchers at the Talos threat research group have published a report on a new form of malware that’s very difficult to detect.

2017-03-21

Is There A Positive Aspect To CIA Spying?

US spy agencies have quite extraordinary secret hacking powers. Wikileaks might actually promote discussion about what people really think about that.

2017-03-21

A Common Language For Sharing Intelligence On Cybersecurity Threats

Threat analysts need a more robust framework for characterizing suspicious activity on their endpoints and networks. By Jane Ginn

2017-03-21

The High Cost Of Politicising Intelligence

Intelligence analysis is more an imperfect art than a science: Gaps in reporting, bad sources and politicisation all complicate the analyst’s task.

2017-03-21

Keeping The Cloud Safe: Exclusive Report

IT Managers are struggling keep their business applications and data safe in the Cloud, and many are slowing down adopting Cloud processes.

2017-03-21

Bank-Attack Hackers Use Russian Decoys

Hackers behind the international attacks on banks intentionally inserted Russian words & commands into their malware to deceive investigators.

2017-03-20

Estonian Honey Trap

Beware: Russia could set 'honey traps' for British troops when they deploy according to Estonia's intelligence chief.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Hyve

Hyve

Hyve provide a wide range of managed web hosting services including private, hybrid and public VMware cloud hosting.

ABL Cyber Academy

ABL Cyber Academy

ABL provide certified training courses in the field of cyber security and IT project management.

NRI Secure Technologies

NRI Secure Technologies

NRI SecureTechnologies is a Cybersecurity group company of the Nomura Research Institute (NRI) and a global provider of next-generation Managed Security Services and Security Consulting.

Snyk

Snyk

Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world.

VADO Security Technologies

VADO Security Technologies

VADO Security enables the safe transfer of data between low & high security networks.

Logsign

Logsign

Logsign is a Security Orchestration, Automation and Response (SOAR) platform with next-gen Security Information and Event Management (SIEM) solution.

SteelCloud

SteelCloud

SteelCloud has spent the last decade inventing technology to automate policy compliance, configuration control, and Cloud security.

GOVCERT.lu

GOVCERT.lu

GOVCERT.lu is responsible for the treatment of all computer related incidents jeopardising the information systems of the government and defined critical infrastructure operators in Luxembourg.

Tutamantic

Tutamantic

Tutamantic develops software that reduces security risks and weaknesses during the architectural and design stages.

SafeCipher

SafeCipher

SafeCypher are crypto specialists with a very specialized knowledge of Public Key Infrastructure (PKI), Hardware Security Modules (HSM), Quantum Resistant Cryptography and Crypto-Agility.

Nisos

Nisos

Nisos provides unrivaled protection of your reputation and assets through the practice of Active Defense.

RedHunt Labs

RedHunt Labs

RedHunt Labs is a premier Cybersecurity Solutions provider, offering Attack Surface Management solution 'NVADR' and Penetration Testing services.

Global Cybersecurity Association (GCA)

Global Cybersecurity Association (GCA)

GCA’s Symposium and conferences featuring global thought leaders and CISOs provide a global best practice perspective on cybersecurity.

CliftonLarsonAllen (CLA)

CliftonLarsonAllen (CLA)

CLA exists to create opportunities for our clients through industry-focused advisory, outsourcing, audit, tax, and consulting services.

TatvaSoft

TatvaSoft

TatvaSoft is a custom software development company delivering business IT solutions and related services to customers across the globe.

ECIT

ECIT

ECIT is your preferred provider of finance and IT services. We believe in the value of combining financial and IT services to streamline and improve the operation of your business.