FREE TO VIEW


« Back to News

2015-10-28

Cyber Warfare: Regional Is Becoming Global

Today’s small wars and border conflicts are being fought online and under the radar, but the conflicts could escalate into real world wars.

2015-10-30

The Arrival of Algorithmic Business

In today’s digital era, dynamic, digital algorithms are at the core of new customer interactions.

2015-10-28

Hackers Compromise Cisco Web

Malicious, data stealing JavaScript injected in the Cisco Web VPN login page of targeted organizations is hosted on legitimate sites.

2015-10-28

Germany Will Make Telecoms Companies Disclose Data To Police.

Despite two previous laws having been ruled unconstitutional, data retention is back in Germany.

2015-10-28

Apple Removes Spy Apps

Apple recently removed several apps from its store that pose a security risk by exposing a person's Web traffic to untrusted sources.

2015-10-28

Banks Under Constant Hacker Attacks

When Hackers are looking to steal as much money as possible as quickly as possible, they go where the money is.

2015-10-28

Jobs Are Disappearing to the Digital Revolution

Gartner is forecasting some major changes in technology, especially in areas like 3D printing, machine learning and voice recognition.

2015-10-26

Your Personal Safety. There’s An App For That

A crowd sourced App that enables you to reach out for help to other users nearby.

2015-10-27

New Software To Identify ISIS Recruiters

Russian researchers are working on new computer software to locate potential ISIS recruiters online.

2015-10-27

UK Cybercrime & Online Fraud on the Rise

The changing face of crime in Britain has been underlined by new official data showing the growing threat of cyber crime and online fraud.

2015-10-27

Who Is responsible For Security in the Cloud?

Ponemon Survey: Only one third of respondents are confident the Cloud meets their security objectives.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Senetas

Senetas

Senetas is a leading developer and manufacturer of certified high-assurance encryption solutions, dedicated to protecting network transmitted data without compromising performance.

IFE Digital Systems

IFE Digital Systems

IFE Digital Systems conducts research, development and consultancy in risk, safety and security related to digital systems in critical infrastructure.

Variti

Variti

Variti Intelligent Active Bot Protection technology — traffic analysis, detection and stopping of malicious bots in real-time and effective response to DDoS attacks.

Crown Sterling

Crown Sterling

Crown Sterling delivers next generation software-based, AI-driven cryptography in the form of random number generators and encryption products.

Privacera

Privacera

Privacera enables consistent data governance, security, and compliance across all your data services - on-premises and in the cloud - so you can maximize the value of your data.

PSafe

PSafe

PSafe is a leading provider of mobile privacy, security, and performance apps. We deliver innovative products that protect your freedom to safely connect, share, play, express and explore online.

Intel

Intel

Intel products are engineered with built-in security technologies to help protect potential attack surfaces.

SubCom

SubCom

How Much Do You Trust Your Endpoint? With our ‘Habituation Neural Fabric’ based endpoint security platform, you can observe and manage the Trust Score of your endpoints in real-time.

Iris Powered by Generali

Iris Powered by Generali

Iris Powered by Generali is an identity theft resolution provider. Our offering combines expert assistance and support with user-friendly identity protection technology.

ResilientX

ResilientX

ResilientX is an All-In-One Security Testing Platform designed to help MSPs and SMBs to perform their security testing and assessments without having to outsource IT.

Global Resilience Federation (GRF)

Global Resilience Federation (GRF)

GRF builds, develops and connects security information sharing communities for mutual defense.

Oz Forensics

Oz Forensics

Oz Forensics is a global leader in preventing biometric and deepfake fraud. It is a developer of facial Liveness detection for Antifraud Biometric Software with high expertise in the Fintech market.

Aegis Cyber Defense Systems

Aegis Cyber Defense Systems

AEGIS is a powerful cybersecurity tool that can help protect your devices and networks from cyber threats, and increase performance.

inSOC

inSOC

inSOC is an enterprise-grade AI-driven SOCaaS solution detecting breaches 24/7 with vulnerability management built-in. Designed for MSPs and MSSPs.

DHCO IT

DHCO IT

The DHCO IT team are experts in IT support, cyber security, cloud support and disaster recovery, and are Microsoft 365 partners.

Zeus Cloud

Zeus Cloud

Zeus Cloud provide clients with world-class web hosting services to businesses both big and small.