FREE TO VIEW


« Back to News

2017-01-10

CIOs Defend Against Cybersecurity Threats Using Behavioral Analytics

Anomaly-detecting analytics can help anticipate and detect a variety of threats, including phishing scams and advanced persistent threats.

2017-01-09

Driverless Future Won't Start With Self-driving Cars

Look Out! You are more likely to see a driverless truck on the motorway before you see a self-driving car.

2017-01-09

Will It Be Possible To Hack Connected Nuclear Weapons?

Future nuclear warheads will be networked, with a greater potential for mishaps. Is that wise?

2017-01-09

CIOs Are Neglecting Process & Most Efficient Options

Improving business processes can lead to clear benefits in procuring operational efficiency and gaining a competitive business advantage.

2017-01-06

Trump Offers A Cyber Security Warning

No computer is safe: If you have something really important, write it out and have it delivered by courier.

2017-01-06

New Age of Digital Farming

Precision Agriculture can transform the food industry to be more efficient, less costly, and more sustainable.

2017-01-06

Ex-MI6 Chief Warns Over Electronic Voting

The stubby pencil and piece of paper that you put your cross on in the ballot box is actually much more secure than anything which is electronic

2017-01-06

Virtual Reality Is Getting Real In 2017

Is VR is going to become the next major computing platform, in the same way that mobile phones have superceded desktop PCs?

2017-01-06

Company Boards Need To Get A Grip.

Corporate leaders, especially boards of directors, aren't taking the necessary actions to defend their companies against cyber attacks.

2017-01-06

Digital Forensics, Incident Response & Attribution

The cost of not taking cyber security seriously today is just like the cost of not having your business properly insured.

2017-01-05

Artificial Intelligence, Self-driving Cars & Cyberwar In 2017

If 2016 was a year of unprecedented disruption in the Technology sector, what does 2017 hold in store? More of the same....

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

InfoSec People

InfoSec People

InfoSec People is a boutique cyber and technology recruitment consultancy, built by genuine experts.

Encode

Encode

Encode delivers a cutting edge Security Analytics & Response Orchestration platform and best of breed Cyber Security Operations and Services.

CYBERPOL

CYBERPOL

CYBERPOL's mission is to facilitate the widest possible mutual assistance between all cyber crime law enforcement authorities to help mitigate global cyber threats.

KnowBe4

KnowBe4

KnowBe4 is an integrated platform for security awareness training combined with simulated phishing attacks.

National Cyber Security Authority (NCA) - Saudi Arabia

National Cyber Security Authority (NCA) - Saudi Arabia

The NCA is the government entity in charge of cybersecurity in Saudi Arabia and serves as the national authority on its affairs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Combined Selection Group (CSG)

Combined Selection Group (CSG)

CSG are Global Talent Experts, we operate across 7 specialist sectors, including Information Technology and Cybersecurity, and take a pro-active approach to executive search and headhunting.

Cyber Risk Aware

Cyber Risk Aware

Cyber Risk Aware provide a security awareness and phishing simulation platform that focuses on real threats and educates and empowers employees to be the first line of defence.

SecureThings

SecureThings

SecureThings focus is to provide guidance and technology to secure connected vehicles in order to build end-to-end security for the automotive industry.

Aversafe

Aversafe

Aversafe provides individuals, employers and certificate issuers around the world with a first line of defense against credential fraud.

BIO-key

BIO-key

BIO-key is a pioneer and innovator, we are recognized as a leading developer of fingerprint biometric authentication and security solutions.

SecureLogix

SecureLogix

SecureLogix deliver a unified voice network security and call verification solution. Protect against call attacks & fraud.

VISTA InfoSec

VISTA InfoSec

VISTA InfoSec is a global Information Security Consulting firm with offices based in US, UK, Singapore and India.

Mission Critical Partners (MCP)

Mission Critical Partners (MCP)

Mission Critical Partners is committed to delivering innovative solutions that help our clients enhance and evolve their critical-communications systems and operations.

ThreatNG Security

ThreatNG Security

ThreatNG is redefining external attack surface management (EASM) and digital risk protection with a platform of unmatched breadth, depth, and capabilities in thwarting technical and business threats.

Xeol

Xeol

Software free of vulnerabilities, built and distributed by trusted entities. Our mission is to help customers secure their software from code to deploy.