FREE TO VIEW


« Back to News

2016-01-20

EU General Data Protection: A Milestone Of The Digital Age

The recently agreed-upon EU General Data Protection Regulation (GDPR) might be the most important piece of legislation in the history of the EU.

2016-01-19

Drone Market Worth $14.9 Billion by 2020

The Unmanned Aerial Vehicles (UAV) market is estimated to reach $14.9 Billion by 2020, at a CAGR of 8.12% from 2015.

2016-01-19

Mandatory Requirement on Business To Disclose Cyber Attacks

Companies that do not “come clean” about being the victims of cyber crime should face prosecution, says British MP.

2016-01-21

Can the Warfare Concept Of Manoeuver Be Usefully Applied In Cyber Operations?

Although the cyber domain has unique characteristics, the timeless principles of manoeuver warfare still apply. Opinion by David Gioe

2016-01-18

ISIS Has a New Secure Messaging App

An encrypted Android app for exchanging secure messages, joining another app that distributes propaganda and recruiting material.

2016-01-15

Five Things That Happened To Data In 2015

2015 was a fascinating and challenging year for all those involved with data. Here are the 5 most significant. Opinion by David Reed of DataIQ

2016-01-15

US Critical Infrastructure Is Vulnerable To Electromagnetic War

An EMP attack could fry all non-shielded electronics, crippling infrastructure and paralysing both vital & non-vital services.

2016-01-15

NSA Chief Says The Rules of War Do Apply to Cyberwar

The Pentagon keeps its rapidly expanding cyber arsenal almost entirely secret.Is there a way to publicly discuss the future of cyber operations?

2016-01-13

Predictive Analytics Tools Confront Insider Threats

Advanced data analytic technology can give analysts an advantage in finding insider threats.

2016-01-13

Experts Make 2016 Cybersecurity Predictions

A new frontier of data breach issues is on the horizon

2016-01-14

Cyberwar Represents An Existential Threat

The advent of cyberwar represents a new “high bar risk” as the U.S. faces-off against a deadly triad of cutting-edge digital technologies.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Lynx Software Technologies

Lynx Software Technologies

Lynx provide secure software and operating systems for use in mission critical applications such as aerospace, medical, transportation and IoT.

Cobalt Strike

Cobalt Strike

Cobalt Strike is penetration testing software designed to execute targeted attacks.

Ideagen

Ideagen

Ideagen provides information management, safety, risk and compliance software solutions that allow organisations to achieve operational excellence, regulatory compliance and reduce risk.

HelseCERT

HelseCERT

HelseCERT is the health and care sector's national information security center for Norway.

Threat Intelligence

Threat Intelligence

Threat Intelligence is a specialist security company providing penetration testing, threat intelligence, incident response and training services.

Secarma

Secarma

Secarma provides penetration testing, security assessments, consultancy, and training services to ensure your digital infrastructure is secure from cybersecurity threats.

Prove & Run

Prove & Run

Prove & Run provides a patented software development toolchain that is specifically forged to deal with the complex security properties of sensitive software components.

Dubai Electronic Security Center (DESC)

Dubai Electronic Security Center (DESC)

Dubai Electronic Security Center (DESC) was founded to develop and implement information security practices in Dubai.

Cyber Base

Cyber Base

Cyber Base is an Information Technology company based in Uganda providing software and hardware solutions to clients.

Scanmeter

Scanmeter

Scanmeter helps identifying vulnerabilities in software and systems before they can be exploited by an attacker.

Rentalworks

Rentalworks

Rentalworks is a leading provider of Internet-of-Things (IoT) Asset Lifecycle Management Services including secure data erasure and disposal.

Vector Informatik

Vector Informatik

Vector Informatik is a specialist in automotove electronics and provides services, embedded software and tools for securing embedded systems against cyber-attacks.

National Cyber Safety and Security Standards (NCSSS) - India

National Cyber Safety and Security Standards (NCSSS) - India

National Cyber Safety and Security Standards has been started with a great vision to safeguard India from the current threats in the cyber space.

SubCom

SubCom

How Much Do You Trust Your Endpoint? With our ‘Habituation Neural Fabric’ based endpoint security platform, you can observe and manage the Trust Score of your endpoints in real-time.

SEK Security Ecosystem Knowledge

SEK Security Ecosystem Knowledge

SEK helps companies in the complex path of cybersecurity; in the analysis, detection and prevention of digital threats.

Dropzone AI

Dropzone AI

Dropzone AI are creating a generational leap in SecOps by using AI to automate cyber expertise and tooling.