FREE TO VIEW


« Back to News

2016-06-30

Intelligent Robots And Automation Encroaching On All Industry Sectors

We’re seeing automation of labor across every industry, including manufacturing, wealth management and medicine.

2016-06-29

ISIS, The Pentagon & The Lone Wolf Syndrome

As the counter-terrorism battle moves online, DARPA seeks to track how ISIS spreads its ideas, and how well the it's defenses are working.

2016-06-27

The Future Of Policing In The Digital Age

We live in a time where the global sharing of threat intelligence is not only possible; it’s vital. Opinion By Alfred Rolington

2016-06-28

False Flags: The Kremlin’s Hidden Hand

The notorious hacking gang calling itself the Cyber Caliphate might not be what it claims to be.

2016-06-29

Charge Companies for Cyber Security Failures

British MPs recommended that companies should be fined if they fail to guard against cyber-attacks, following last year's TalkTalk hack.

2016-06-28

Russian Cyber Gangs Linked To Bank Robberies

Investigators have linked malware used by Russian and eastern European cyber-gangs to a string of bank thefts perpetrated using SWIFT.

2016-06-29

The Cyberwar Frontier In Korea

North Korea's "cyber army" has doubled in size to 6,000 troops and the South is racing to increase its capability to meet the rising threat.

2016-06-30

For Sale: Access to 70,000 Hacked Computer Networks

Kaspersky has uncovered an online marketplace where criminals sell access to more than 70,000 hacked corporate & government servers for $6 each.

2016-06-29

New US Biometric Passport Regulations Will Prevent Entry To Millions

The US government has quietly introduced requirements for all travelers to hold electronic biometric passports to enter the country.

2016-06-29

Hackers Target Vulnerabilities Across US Politics

Russian hackers have burrowed deep into the US political system, sweeping in law firms, lobbyists, consultants, foundations and think tanks.

2016-06-27

Snowden Calls For Special Protection For Whistleblowers

Should there be special protection for government employees who break secrecy laws? Safe in Moscow, Edward Snowden thinks so.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Superscript

Superscript

Superscript (formerly Digital Risks) is an insurance broker for small businesses, sole-traders, landlords and high-growth tech firms. Our services include Cyber Liability insurance.

FIRST Conference

FIRST Conference

Annual conference organised by the Forum of Incident Response and Security Teams (FIRST), a recognized global leader in computer incident response.

BlueID

BlueID

BlueID is an IDaaS technology product which enables your objects to securely connect and interact with your users’ smart phones and smart watches.

Komodo Consulting

Komodo Consulting

Komodo Consulting specializes in Penetration Testing and Red-Team Excercises, Cyber Threat Intelligence, Incident Response and Application Security.

Telelogos

Telelogos

Telelogos is a European provider of Enterprise Mobility Management software, Digital Signage software and Data Transfer and Synchronization software.

Ordr

Ordr

Ordr Systems Control Engine. The first actionable AI-based systems control engine for the hyper-connected enterprise. You’re in control.

SIRP Labs

SIRP Labs

SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response.

Prosperoware

Prosperoware

Prosperoware develop software for cybersecurity, privacy, and regulatory compliance for content systems, and financial matter management.

QuoIntelligence

QuoIntelligence

QuoIntelligence experts can help your team understand the evolving cyber threats and provide simple yet comprehensive recommendations so you can focus on what matters.

Innefu Labs

Innefu Labs

Innefu is an Information Security R&D startup, providing cutting edge Information Security & Data Analytics solutions.

Conseal Security

Conseal Security

Mobile app security testing done well. Conseal Security are specialists in mobile app penetration testing. Our expert-led security analysis quickly finds security vulnerabilities in your apps.

KYND

KYND

KYND has created pioneering cyber risk technology that makes assessing, understanding, and managing business cyber risks easier and quicker than ever before.

Extreme Networks

Extreme Networks

Since 1996, Extreme has been pushing the boundaries of networking technology, driven by a vision of making it simpler and faster as well as more agile and secure.

rSolutions

rSolutions

rSolutions delivers managed cybersecurity services to clients in many industry sectors including financial services, telecommunications, energy, government and retail.

ID R&D

ID R&D

ID R&D is an award-winning provider of AI-based facial liveness, document liveness, and voice biometrics.

Brunswick Group

Brunswick Group

Brunswick is a critical issues firm. We advise the world’s leading companies on how to navigate the critical issues they face and engage with their critical stakeholders.