FREE TO VIEW


« Back to News

2016-02-05

Will Robots Save The Future Of Work?

Is a robot coming for your job? If Gartner’s predictions are correct, the answer could be leaning more definitively toward yes.

2016-02-05

GCHQ Telephone Security Is 'open to surveillance'

Software developed by the UK intelligence agency GCHQ contains weaknesses making it possible to eavesdrop on phone calls.

2016-02-05

US Critical Infrastructure Is At Cyber Risk

Modern warfare or crime fighting is not just about bullets, bombs and missiles in physical space. It’s also about hacking in cyber space.

2016-02-06

After The OPM Hack Security Clearances Will Now Be Done By The Pentagon

OPM Dumped: The US is shifting the responsibility for background investigations of sensitive personnel to the Defense Department.

2016-02-02

90% of Data Breaches Are Avoidable

Nine of every ten data breaches in 2015 could have been “easily prevented,” according to a study by The Online Trust Association.

2016-02-03

Healthcare Data Is The Holy Grail for Cyber Thieves

Sophisticated hackers looking to lift the treasure trove of information found in health records are now the leading cause of data loss.

2016-02-03

Facebook’s Next New Data Center Is Coming To Ireland

Renewable Energy & Low Taxes: Facebook announces it plans to open its second European data center in Ireland.

2016-02-06

The Internet of Things Needs Another 10 Years

The IoT is an exciting growth opportunity. The problem is that it is really many different opportunities, each growing at its own pace.

2016-02-03

China & Indonesia Engage In Joint Cyber War Simulations

Indonesia and China's cooperation suggests that weaker nations cannot provide national cyber security on their own.

2016-02-03

The EU Wants To Organise The New Tech Economy

Look Out! The EU Commission is developing a strategy and an action plan to support the digitalisation of European industry.

2016-02-03

Europe’s Digital Watchdog Zeros In On US Tech

France’s top privacy regulator will police how digital data is transferred outside of the European Union, putting pressure on US companies' profits.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Huawei

Huawei

Huawei is a leading global ICT solutions provider. with end-to-end capabilities across the carrier networks, enterprise, consumer, and cloud computing fields.

CyTech Services

CyTech Services

CyTech provides Forensics Incident Response, Cyber Security and Training services.

Redcentric

Redcentric

Redcentric is a leading UK IT managed services provider. We deliver managed IT, cloud computing, data backup, information security services and managed networks.

Skurio

Skurio

Skurio create cost-effective, intuitive and powerful Cloud based solutions to identify threats, detect data breaches outside the network and automate the response.

QA

QA

QA is a leading IT training provider in the UK with over 1,500 courses covering all areas of IT including Cyber Security.

CYQUEO

CYQUEO

CYQUEO is your professional partner and system integrator. We secure your organization against advanced cyber threats.

Innova

Innova

Innova is Turkey's leading IT solutions company, providing platform independent solutions to organizations in telecommunication, finance, production, public and service sectors.

RISE

RISE

RISE is an independent, State-owned research institute, which offers unique expertise and over 100 testbeds and demonstration environments for future-proof technologies, products and services.

Vortiv

Vortiv

Vortiv Ltd (formerly known as Transaction Solutions International Ltd) is a technology based company focused on the cybersecurity and the cloud services sector.

NuCrypt

NuCrypt

NuCrypt is developing technology that is applicable to ultrahigh security data encryption as well as key distribution.

eXate

eXate

eXate provides pioneering technology that empowers organisations to protect, control and manage their sensitive data centrally, providing a complete data privacy solution.

Whistic

Whistic

Whistic is a cloud-based platform that uses a unique approach to address the challenges of third-party risk management.

ContraForce

ContraForce

ContraForce is a threat detection and response software providing complete visibility across cloud, network, endpoints, user, and email with the ability to target and block threats in real-time.

LogicalTrust

LogicalTrust

LogicalTrust security testing specialists find the weakest points in your company and show you how to fix them step-by-step, as well as how to improve your security.

Venari Security

Venari Security

Venari is an award-winning cybersecurity SaaS provider that has developed an ETA (Encrypted Traffic Analysis) platform which fundamentally changes the way encrypted traffic is analysed.

Protos Labs

Protos Labs

Protos Labs enables insurers & enterprises to make better cyber risk decisions through holistic, real-time risk management tools.