FREE TO VIEW


« Back to News

2017-01-25

Defence Research Agency To Create Secure Data-Sharing Tech

DARPA is working on new ways to enable US troops working in remote areas to securely send and receive sensitive information on their devices.

2017-01-25

Nissan Self-Drive Trial Begins In London

Nissan will start testing its electric Leaf car with autonomous driving capabilities in London, beginning its first European trials on public roads.

2017-01-31

How Cyber Propaganda Influenced Politics in 2016

Fake News & Hackers: Throughout history, politically motivated threat actors have tried to influence public opinion to reach their goals.

2017-01-31

US Army Wants To 3D-Print Mini-Drones

Build It Yourself: Future soldiers will make their own eyes-in-the-sky on the go.

2017-01-25

Fear Factor: Pushing Up Cyber Insurance Costs

Awareness of the risks attached to technology is a good thing. But there is a downside as premiums take off.

2017-01-31

Bitcoin Surges As China Battles Capital Flight

Exploding bitcoin trade in China has sparked concerns that the crypto-currency offers an easy route around foreign exchange controls.

2017-01-31

Smart City Technology Is Growing

The adoption of smart city technology to manage traffic, water supplies, air pollution and other needs will see an upswing this year in US cities.

2017-01-30

Iranian Malware Delivered Via Fake Oxford University Sites

An Iran-linked advanced persistent threat (APT) group has used fake University of Oxford websites to deliver malware to victims.

2017-01-30

Cyberwar: How Prepared Is Nepal?

Vulnerable: The main reason Nepal has become a target for cyber attackers is the chaos and confusion caused by a big earthquake.

2017-01-30

How Much Cyber Insurance Is Enough?

How a top security manager feels about cyber insurance often may have a lot to do with the type of company he or she works for.

2017-01-25

GCHQ Wants Teenage Girls To Join The Cybersecurity Fight

Teenage girls who spend time online and on social media could become the UK's spies of the future. Or so Britain's intelligence agency hopes.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Foregenix

Foregenix

Foregenix are global specialists in Digital Forensics and information security including Penetration testing and Website Security.

AirCUVE

AirCUVE

AirCUVE provide authentication and access control solutions for networks and mobile security.

Smoothwall

Smoothwall

Smoothwall develop intelligent web filtering, Monitoring and security solutions designed to protect users worldwide.

IberLayer

IberLayer

IberLayer is the company behind the Email Guardian service, a cloud based Email Total Protection system that filters and blocks email threats.

XPO IT Services

XPO IT Services

XPO IT Services are dedicated to providing secure, high quality IT recycling and asset disposal services.

Cowbell Cyber

Cowbell Cyber

Cowbell Cyber™ offers continuous risk assessment, comprehensive cyber liability coverage, and continuous underwriting through an AI-powered platform.

QuillAudits

QuillAudits

QuillAudits offers advanced Ethereum, EOS, TRON smart contract audit, blockchain protocol security and formal verification to ensure your platform’s integrity.

Beyond Identity

Beyond Identity

Beyond Identity employs an elegantly simple concept, the personal certificate authority and self signed certificates, to replace passwords.

Conatix

Conatix

Conatix was formed to apply recent advances in AI and other fields of technology to insider fraud, one of the most intractable problems in cybersecurity.

Realsec

Realsec

RealSec is an international company and is a developer of encryption and digital signature systems and Blockchain for the Banking and Methods of Payment sectors, Government and Defense and Multisector

Citizen Lab - University of Toronto

Citizen Lab - University of Toronto

Citizen Lab focuses on research and development at the intersection of cyberspace, global security & human rights.

Pacific Global Security Group

Pacific Global Security Group

Pacific Global Security Group offers an intelligence-driven focus on all aspects of cybersecurity for IT/ICS/OT.

GoodAccess

GoodAccess

GoodAccess is the cybersecurity platform that gives your business the security benefits of zero trust without the complexities so your users can securely access digital resources anytime, anywhere.

Crygma

Crygma

CRYGMA Quantum-Resistant Cryptographic Machines, the new standard in data encryption.

Omantel Innovation Labs

Omantel Innovation Labs

The Omantel Innovation Labs is a platform to enable startups and innovators to develop and commercialize solutions within selected technology verticals including cybersecurity.

ACDS (Advanced Cyber Defence Systems)

ACDS (Advanced Cyber Defence Systems)

ACDS was founded in the belief that cyber security can be done better. We’re combining emerging technologies and proven methods to bring a new approach to tackling the growing threat landscape.