News

2019-10-18

More Girls Are Applying For Cyber Security Training

Good News: Britain's National Cyber Security Centre report a big increase in young women applying for its CyberFirst cybersecurity courses.

2019-10-17

40% Of Business Lose Out Due To Poor Cyber Security

Cyber security performance is vital to achieve commercial success and a higher focus on security can make all the difference to business.

2019-10-15

AI Security Tool Thinks Much Faster Than Humans

An innovative new cyber security tool has been launched by Darktrace, one that thinks like a human but works at the speed of a computer.

2019-10-21

Serious Cyber Attacks In Singapore Reflect Poor Cyber Security

Despite attacks against businesses becoming very common, corporate cyber security measures are still not as good as they need to be.

2019-10-21

Warning For Pilots To Counter Airborne Hacking

'Cyber Anomaly Detected': A new real time system gives pilots information about what’s happening internally on their aircraft inflight.

2019-10-21

Using Blockchain Against Counterfeit & Forgery

The US Department of Homeland Security (DHS) wants to use blockchain to improve the agency’s ability to deal with counterfeiting and forgery.

2019-10-15

Incompatible: Privacy & The Internet of Things

Video surveillance is now considered an IoT application and cameras often connect with domestic automation systems, threatening privacy.

2019-10-15

Positive Cyber-Secure Training

A new, engaging cyber training app challenges traditional learning & focuses on behavioural change to improve employee security awareness.

2019-10-14

Good Cyber Security Practice On The Go

When you’re traveling - whether domestic or international - it is always important to practice safe online behavior for good cyber security.

2019-10-14

US 2020 Presidential Campaign Cyber Security Examined

Evaluation of the competing 2020 US presidential campaigns' readiness to resist interference and protect privacy reveals some worrying issues.

2019-10-14

Iranian Hackers Deploy New Spear-Phishing Techniques

The Iranian state-sponsored threat actor known as Charming Kitten is using new spear-phishing methods, according to the experts at ClearSky.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CERT.hr

CERT.hr

CERT.hr is the national authority competent for prevention and protection from computer threats to public information systems in the Republic of Croatia.

CommuniTake

CommuniTake

CommuniTake builds security, enablement, and management solutions to provide people and organizations with better, and more secure mobile device use.

VerSprite

VerSprite

VerSprite is a specialist information security consulting firm. We provide organizations with detection across all their attack surfaces and deliver critical insight into all possible attack methods.

ThreatGen

ThreatGen

ThreatGEN™ works with your team to improve your resiliency and industrial cybersecurity capabilities through an innovative and modernized approach to training and services.

DivvyCloud

DivvyCloud

DivvyCloud protects your cloud and container environments from misconfigurations, policy violations, threats, and IAM challenges.

Quantstamp

Quantstamp

Quantstamp are experts in Smart Contract Security Audits. We provide verification that your decentralized system works as intended.

MSPAlliance

MSPAlliance

MSPAlliance is the world’s largest industry association and certification body for cloud computing and managed service professionals.

Help AG

Help AG

Help AG provides leading enterprise businesses and governments across the Middle East with strategic consultancy combined with tailored information security solutions and services.

Pacific Global Security Group

Pacific Global Security Group

Pacific Global Security Group offers an intelligence-driven focus on all aspects of cybersecurity for IT/ICS/OT.

Stacklet

Stacklet

Stacklet provides cloud governance as code platform that accelerates how Global 2000 manages its security, asset visibility, operations, and cost optimization policies in the cloud.

Oxeye

Oxeye

Oxeye fills the gap between cloud and code to show exploitable vulnerabilities, and their path from API to code. More visibility. Less noise. More time to build.

Smile Identity

Smile Identity

Smile Identity helps businesses confirm the true identity of their users in real-time using any smartphone or computer.

NETAND

NETAND

NETAND privileged access and identity management solutions will secure your business from cyber threats.

Queen Consulting & Technologies

Queen Consulting & Technologies

Queen Consulting & Technologies specialize in providing IT support, management, and Security to Gov’t Contractors, CPAs, and Nonprofits.

nodeQ

nodeQ

At nodeQ, we are pioneering the future of computer networks, leveraging our deep expertise in quantum communication, artificial intelligence, and software-defined networking.

OmniIndex

OmniIndex

OmniIndex PostgresBC is the only commercial solution allowing you to keep your most sensitive and critical data encrypted while analyzing it. Structured and unstructured.