FREE TO VIEW


« Back to News

2016-11-09

Healthcare Suffers From A Lack Of Security Awareness

Healthcare organisations have suffered 22 major data breaches in the past year, resulting in the exposure of millions of patients' information.

2016-11-09

Find The Hacker With Action Security Intelligence

Developing actionable security intelligence requires gathering multiple insights regarding the identity, methods & motivation of the attacker.

2016-11-07

IBM Think Ahead: Soon Watson AI Will Be Behind Every Decision

IBM's CEO Ginni Rometty thinks that soon, every important decision, will be made with the assistance of IBM Watson. What does she know?

2016-11-10

Education Is The Key To Minimise Cyber Risk For Business

Cyber criminals are constantly coming up with new ways to steal information; sometimes sophisticated, sometimes not, but all can be effective.

2016-11-14

Pentagon Wants to Use Social Media On the Battlefield

The US military think they can use AI to combine open-source intel from social media with satellite data to produce useful real time intelligence.

2016-10-31

Facebook’s Drone Ambitions Are Getting Bigger

Facebook plans to fly at least one small, wireless drone at an altitude of 400 feet around its headquarters in the coming months.

2016-11-10

Australian Government Networks Hacked

Australian government networks are clearly at high risk of cyber-attacks following a sequence of high profile hacks.

2016-11-08

Cyber Strikeback: Putin’s Aide Hacked

Retaliation? Secret correspondence belonging to a top aide to Russian President Vladimir Putin hacked and leaked.

2016-11-13

Is Apple Abandoning Macs?

Apple has neglected its Mac line in favour of other devices, leaving the Apple faithful wondering if the company is still committed to it?

2016-11-08

Otto's Self-driving Truck Delivers Its First Payload

For those doubting that autonomous vehicles are going to be driving alongside humans very soon, consider the first goods delivery made by Otto.

2016-11-14

Connected-Cars Could Cost Your Privacy

Connected cars are poised to become one of the biggest changes in the driving experience since the invention of the automobile.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ITQ

ITQ

ITQ is an IT consulting firm with a focus on the entire VMware-product portfolio with three main services: Professional Services, Support Services and Managed Services.

Actiphy

Actiphy

Actiphy provides a tried and proven backup and disaster recovery software solution to ensure business continuity at all times.

Logscape

Logscape

Logscape provides a big data analytical tool for log file analysis and operational analytics.

KE-CIRT/CC

KE-CIRT/CC

KE-CIRT/CC is the national Computer Incident Response Team for Kenya.

PrimeKey

PrimeKey

PrimeKey provides organisations with the ability to implement security solutions such as e-ID, e-Passports, authentication, digital signatures, unified digital identities and validation.

Red Balloon Security (RBS)

Red Balloon Security (RBS)

Red Balloon Security is a leading embedded device security company, delivering deep host-based defense for all devices.

Volexity

Volexity

Volexity is a leading provider of threat intelligence and incident suppression services and solutions.

Redshift Consulting

Redshift Consulting

Redshift is an information management and information security consulting company offering a full range of services from infrastructure design to security assessments and network monitoring.

Atakama

Atakama

With Atakama, data remains encrypted until the very moment it is used, and the ability to decrypt is based on zero trust architecture.

In Fidem

In Fidem

In Fidem specializes in information security management, with a bold approach that views cybersecurity as a springboard to organizational transformation rather than a barrier to innovation.

Silicon Labs

Silicon Labs

Silicon Labs are a leader in secure, intelligent wireless technology for a more connected world. We provide award-winning hardware and software security to help safeguard connected devices.

HolistiCyber

HolistiCyber

HolistiCyber provide state-of-the art consulting, services, and solutions to help proactively and holistically defend against a new era of constantly evolving cyber threats.

Difenda

Difenda

Difenda Shield is a fully integrated and modular cybersecurity suite that gives your organization the agility it needs to implement a world-class cybersecurity system.

WinMagic

WinMagic

At WinMagic, we’re dedicated to making authentication and encryption solutions that protect data without causing user friction so that everyone can work freely and securely.

AuthMind

AuthMind

Prevent your next identity-related cyberattack with the AuthMind Identity SecOps Platform. It works anywhere and deploys in minutes.

Getvisibility

Getvisibility

Getvisibility enables customers to detect, classify and protect sensitive information increasing data security, governance, compliance and lowering the risk of losing valuable data.