FREE TO VIEW


« Back to News

2015-11-17

Low-tech Coppers in the UK

Reported crime is down but with big budget cuts, aging technology & new cybercrime challenges, a policeman's lot is not a happy one.

2015-11-18

How the Threat Landscape Will Change By 2020

McAfee Labs attempt to predict how the types of threat actors will change and how the industry will meet these challenges over the next five years.

2015-11-19

Artificial Intelligence Could Drive Human Inequality

A new report suggests that the marriage of AI and robotics could replace so many jobs that the era of mass employment could come to an end.

2015-11-17

'Jihadi John' Strike: US Says 'We Got Him'

Live by the sword, die by the sword. Extrajudicial execution by drone strike of notorious ISIS killer.

2015-11-17

50% of US Businesses Have No Formal BYOD Policy

Years after the widespread adoption of workplace smartphones, most US companies don't have a bring your own device policy to safeguard security.

2015-11-21

Cyber War Games: ‘Too Little Too Late’

Financial centres in London and New York are to be hit with a simulated cyber-attack later this month.

2015-11-21

7 Things You Need to Know About Car Hacking

Car hacking is real and likely to happen much more regularly in the future. Top facts you need to know about this emerging trend.

2015-11-21

Internet of Things will drive the Digital Revolution of Industry

Increased connectivity is going to change the way we communicate and do business.

2015-11-16

UK Banks Face Cyber Security Stress Test - Operation Resilient Shield

UK financial institutions' CIO's will feel the heat as the Bank of England rolls out it's new war-game to test the cyber-resilience of the financial sector.

2015-11-19

Where Next? Paris Attacks Show Mumbai Strikes Are Global Blueprint

The response to global terrorism is far from united. As India has shown, getting two premier security agencies to cooperate is a challenge.

2015-11-11

Essential Cyber Security Tips to Stay Safe Travelling

Travel Advisory: Make sure your cyber security best practices are coming along for the ride.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Australian Cyber Security Growth Network (AustCyber)

Australian Cyber Security Growth Network (AustCyber)

AustCyber brings together businesses and researchers to develop the next generation of cyber security products and services.

Atea

Atea

Atea is the market leader in IT infrastructure for businesses and public-sector organizations in Europe’s Nordic and Baltic regions.

NRD Cyber Security

NRD Cyber Security

NRD Cyber Security create a secure digital environment for countries, governments, and organisations and implement cybersecurity resilience enhancement projects around the world.

InPhySec

InPhySec

InPhySec is a leading New Zealand information, physical and cyber security company.

Totaljobs

Totaljobs

Totaljobs is the UK’s largest hiring platform. We have over 280,000 live jobs adverts on our site, helping you to find any type of job in any industry, including cybersecurity.

S2S Group

S2S Group

S2S Group specialise in the destruction and management of IT assets at the end of the lifecycle.

Keeper Security

Keeper Security

Keeper is a leading enterprise password manager and cybersecurity platform for preventing password-related data breaches and cyberthreats.

GBT Technologies

GBT Technologies

GBT Technologies is a technology company focused on chip design and software to enable IoT, global mesh networks, and for applications relating to artificial intelligence.

NodeSource

NodeSource

NodeSource helps organizations run production-ready Node.js applications with greater visibility into resource usage and enhanced awareness around application performance and security.

Porto Research, Technology & Innovation Center (PORTIC)

Porto Research, Technology & Innovation Center (PORTIC)

PORTIC brings together several research centers and groups from P.PORTO in a single space, forming a superstructure dedicated to research, technology transfer, innovation and entrepreneurship.

Stacklet

Stacklet

Stacklet provides cloud governance as code platform that accelerates how Global 2000 manages its security, asset visibility, operations, and cost optimization policies in the cloud.

Winmill Software

Winmill Software

Winmill is a technology services company that provides expert consulting services in Application Development, Application Security and Cyber Security.

Cyber1

Cyber1

CYBER1 is a leader in cyber security advisory and solutions. We are uniquely placed to help customers achieve cyber resilience and thus, safeguard reputation and value.

Proximus Ada

Proximus Ada

Proximus Ada is the first Belgian center of excellence combining artificial intelligence and cybersecurity.

Cyber Octet

Cyber Octet

Cyber Octet is an IT Solution, Security, Training and Services company. We provide training and services from Web Application Security to ISO 27001 implementation.

Auxilion

Auxilion

Auxilion is an award-winning provider of consulting and IT support services, technologies and consulting for public and private organisations in the UK and Ireland.