FREE TO VIEW


« Back to News

2017-03-03

Google To Break Pirates Over Music Searches

UK government-hosted talks spanning two Parliaments have culminated in Google and Bing at last agreeing to tweak their search results in response to copyright-holders' concerns, thereby heading off threatened legislation on their conduct.

2017-03-25

Facebook & Google Are Killing Newspapers

National and local newspapers are dying, while Facebook along with Google controls two-thirds of the online advertising market.

2017-04-21

Malvertising Targets Your Online Users

Many of the most popular websites have at one time or another unwittingly hosted malicious ads.

2017-03-03

Cyber-Workforce Shortage to Increase

The serious talent shortage in the information security workforce shows no sign of waning:

2017-04-21

Cyber Skills Gap Grows Along With Threats

Cybersecurity Skills Gap: Fewer than one in four job applicants possess the qualifications that employers are looking for.

2017-02-27

Snowden Helping To Protect Journalists

Edward Snowden is working on tools for journalists that he hopes will help to protect them and their sources from government surveillance.

2017-02-24

DDoS Protection: 14 Unique Ways to Protect Your Organisation

DDoS attacks have become a nightmare for companies with an active online presence. Here are 14 ways to protect your business.

2017-04-04

Deep Learning Technologies

Computer scientists have developed tiny computers to make smarter, smaller sensors for medical devices and the IoT using less energy.

2017-04-11

Dubai Tests Autonomous Aerial Vehicle

Another step towards innovative and smart mobility solutions for reducing city traffic congestion using passenger drones.

2017-04-07

Facial Recognition Technologies

US Homeland Security is rushing to equip airports with biometric security systems, including sophisticated facial recognition software.

2017-02-21

Hard To Keep The Cloud Safe Without Skills

IT managers are finding it difficult to keep their applications and data safe in the cloud, and many are slowing cloud adoption because of it.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Charlton Networks

Charlton Networks

Charlton Networks provide a complete range of IT infrastructure, network and security solutions aimed at SME companies.

Trend Micro

Trend Micro

Trend Micro is a leader in hybrid cloud, endpoint, and network security solutions.

Open Networking Foundation (ONF)

Open Networking Foundation (ONF)

The Open Networking Foundation (ONF) is a non-profit operator led consortium driving transformation of network infrastructure and carrier business models.

Repository of Industrial Security Incidents (RISI)

Repository of Industrial Security Incidents (RISI)

RISI is a database of cyber security incidents that have (or could have) affected process control, industrial automation or SCADA systems.

Eustema

Eustema

Eustema designs and manages ICT solutions for medium and large organizations.

Semperis

Semperis

Semperis is an enterprise identity protection company that enables organizations to quickly recover from accidental or malicious changes and disasters that compromise Active Directory.

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU-ARCC acts as ITU’s cybersecurity hub in the Arab Region localizing and coordinating cybersecurity initiatives.

Micro Strategies Inc.

Micro Strategies Inc.

Micro Strategies provides IT solutions that help businesses tackle digital transformation in style.

Identifi Global Recruitment

Identifi Global Recruitment

Identifi Global is one of the UK's leading Cyber Security & IT Recruitment specialists.

Templar Shield

Templar Shield

Templar Shield is a premier information security, risk and compliance technology professional services firm serving North America.

usecure

usecure

usecure is a global provider of computer-based cyber security awareness training, offering the market’s most time-efficient, cost-effective and admin-lite solution for reducing insider threats.

Barikat Cyber Security

Barikat Cyber Security

Barikat is a provider of information security solution and services including security analysis and compliance, security testing, managed security services, incident response and training.

TransUnion

TransUnion

TransUnion is a global information and insights company that makes it possible for businesses and consumers to transact with confidence.

SOOS

SOOS

SOOS is the easy-to-integrate software security solution for your whole team. Build, catch, and fix vulnerabilities with SOOS Software Composition Analysis.

Althammer & Kill

Althammer & Kill

Althammer & Kill offers pragmatic solution concepts for data protection and digitization. We advise in the field of data protection, information security and compliance.

Trustmarque

Trustmarque

Trustmarque delivers customer-centric IT solutions that enable better outcomes. We combine the technology, expertise and services to release value at every stage of the IT lifecycle.