News

2018-08-09

Cyber AI In the Cloud: Securing New Computing Models, Applications & Devices

Darktrace: How AI technology is protecting cloud infrastructure from advanced cyber-threats, filling the security gap left by current approaches.

2018-08-06

Facebook Fakers Get Better At Covering Tracks

Creators of fake accounts and news pages on Facebook are learning from their mistakes and making themselves harder to track and identify.

2018-08-28

SamSam: $6 million Ransomware

Sophos say SamSam ransomware affected far more victims than first thought, successfully extorting several $million in ransom demands.

2018-08-23

Digital Resilience Is A Step Up From Cybersecurity

Business resilience means an organisation is able to adopt new systems and processes, ensuring continued competitiveness and business survival.

2018-09-02

Alaska Dusts Off Its Typewriters

Government workers in a borough of Alaska have turned to typewriters to do their jobs, after ransomware infected their computer systems.

2018-08-08

Dixons Carphone Data Breach Hits 10m Users

A data breach at electronics retailer Dixons Carphone is almost ten times larger than the company first thought.

2018-08-31

Surveillance Cameras That Spot Your Personality Type

AI can be used to analyse biometric data, like subtle on-camera eye movement, to predict personality traits better than random guessing.

2018-08-31

What Are Deepfakes?

The Internet now mediates every aspect of our lives, and an inability to trust anything we see could lead to an "end of truth."

2018-08-23

Phone Calls, Texts Or Email - How Do Millennials Communicate?

The fundamentals of good communication don’t change between generations, but personal voice communications are slipping down the priority list.

2018-08-16

Balancing Security With Digital Transformation

How do companies keep up with the pace of technical innovation & competition while protecting their critical assets from security breaches?

2018-08-30

AI Driven Security Is Much More Than An Algorithm

Good data boosts AI's ability to make judgments, and this starts with baseline data about users, devices, network systems and workflow patterns.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Proofpoint

Proofpoint

Proofpoint provide the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, social media and mobile messaging.

Engineering Group

Engineering Group

Engineering is the Digital Transformation Company, a leader in Italy and with over 80 offices across Europe, the United States, and South America.

SecureBrain

SecureBrain

SecureBrain software and services help protect against Japanese-specific cybercrime and global internet security threats such as online fraud, phishing, drive-by downloads and malware attacks.

Tevora

Tevora

Tevora is a specialized management consultancy focused on cyber security, risk, and compliance services.

KeepSolid

KeepSolid

KeepSolid is a Virtual Private Network services provider offering secure encrypted access to the internet.

AAROH

AAROH

AAROH helps customers in Government, Law Enforcement, and Enterprises to identify, prevent, detect, resolve and protect from threats, crimes, breaches & fraud.

Uhuru Corp

Uhuru Corp

Uhuru offers a wide variety of IoT products and solutions including enebular® IoT Orchestration Service.

astarios

astarios

astarios provide near-shore software development services including secure software development (DevSecOps), quality assurance and testing.

Control System Cyber Security Association International (CS2AI)

Control System Cyber Security Association International (CS2AI)

CS2AI is the premier global not for profit workforce development organization supporting professionals of all levels charged with securing control systems.

PreCog Security

PreCog Security

PreCog Security is a US based cybersecurity risk mitigation company. We specialize in helping you find, minimize and manage vulnerability risk within your product, network and process.

doIT Solutions

doIT Solutions

doIT solutions specialize in IT security and infrastructure, security automation, data center, and cybersecurity.

McAfee

McAfee

McAfee is a worldwide leader in online protection. We’re focused on protecting people, not devices. Our solutions adapt to our customers’ needs and empower them to confidently experience life online.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BluSapphire

BluSapphire

BluSapphire is an industry-first, purpose-built, cloud-native, Hybrid XDR platform powered by AI and big data analytics.

Millennium Corporation

Millennium Corporation

For nearly two decades, Millennium Corporation has been operating on the leading edge of cybersecurity.

Nova Microsystems

Nova Microsystems

Nova's mission is to revolutionize cybersecurity through continuous data analysis and dynamic AI-driven encryption.