News

2018-08-30

GDPR Means Revisiting Email Marketing

Business can no longer approach email marketing strategies casually. Under GDPR, you are required to be able to prove every user chose to sign up.

2018-08-30

Satellite Imagery + Social Media = A New Way To Spot Emerging Nuclear Threats

Hiding illicit nuclear programs might be getting harder, thanks to new ways of gleaning and combining clues from different rivers of digital data.

2018-08-07

Criminals Are Driving Australian Data Breaches

Criminal attacks accounted for the majority of data breaches reported to the Office of the Australian Information Commissioner in Q2 2018.

2018-08-29

Estonia’s Cyber Revenge

Estonia, the small EU nation that was the first target of state-sponsored cyber warfare from Russia, may soon be able to strike back.

2018-08-29

Bank Industry Is Turning On To AI Technology

The rapid growth of AI is due to increasing market competition, the need to reduce overheads plus the benefits of capturing large volumes of data.

2018-08-29

What Is Stuxnet And Who Created It?

Thanks to Stuxnet, we now live in a world where covertly inserted malicious code can destroy machinery and stop (or start) a war.

2018-08-29

How Silicon Valley Became A Den Of Spies

Foreign spies have been showing up in Silicon Valley for a very long time and that has never been more true than today.

2018-08-28

One Answer To Cyber Attacks Is To Hack Back

Experts think the US government, along with private companies should go on the offensive by using the hackers’ own methods against them.

2018-08-28

The US Is Losing the Information War To Russia

NATO see no evidence that Russia's disinformation efforts have slackened, nor that the US is equipped to develop an effective response.

2018-08-30

World’s Top 20 Cybersecurity Companies

The experts at Pagan Research have ranked the top 20 in the Cybersecurity 500 leading cybersecurity companies.

2018-08-28

Nobody Is Talking About The  Age of Cyberwar

There is little debate about using cyber weapons, perhaps because these weapons remain invisible, the attacks deniable and the results uncertain.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Japan Information Security Audit Association (JASA)

Japan Information Security Audit Association (JASA)

JASA is non-profit association active in developing and managing the quality of Information Security Auditing and Auditors in Japan.

Subex

Subex

Subex leverages its award-winning telecom analytics solutions in areas such as Revenue Assurance, Fraud Management, Asset Assurance and Partner Management, and IoT Security.

Rafael

Rafael

Rafael has more than 15 years of proven experience in the cyber arena providing solutions for national security as well as commercial applications.

SMiD Cloud

SMiD Cloud

SMiD encryption technology has been developed following the highest security practices to allow the data availability, integrity and confidentiality.

RangeForce

RangeForce

RangeForce delivers the only integrated cybersecurity simulation and skills analysis platform that combines a virtual cyber range with hand-on training.

Sectigo

Sectigo

Sectigo is a leading cybersecurity provider of digital identity solutions, including TLS / SSL certificates, DevOps, IoT, and enterprise-grade PKI management, as well as multi-layered web security.

MCPc

MCPc

MCPc improves the security and well-being of our clients. We protect data, manage the complexity and sustainability of technology, empower employee performance, and ultimately reduce business risk.

Ascent Cyber

Ascent Cyber

Ascent Cyber provide simple and stress-free solutions to protect your business and its customers from the worries and costs of cybercrime.

Cardonet

Cardonet

Cardonet is an IT Support and IT Services business offering end-to-end IT services, 24x7 IT Support to IT Consultancy, Managed IT and Cyber Security.

Sotero

Sotero

Sotero is the first cloud-native, zero trust data security platform that consolidates your entire security stack into one easy-to-manage environment.

Aravo Solutions

Aravo Solutions

Your Extended Enterprise is full of hidden risks – Aravo makes them visible, measurable, and manageable.

Armolon

Armolon

Armolon provides comprehensive data breach and cybersecurity, as well cybersecurity audits and certifications, and disaster recovery/business continuity services to clients.

Custodia Continuity

Custodia Continuity

Custodia Continuity manage your Security, Backup, Continuity and Compliance. You get on with your business.

North Green Security

North Green Security

North Green Security is a UK-based cyber security training and consultancy company.

Backslash Security

Backslash Security

With Backslash, AppSec teams gain visibility into critical risks in their apps based on reachability and exploitability.

Cybersecurity Elastic Laboratory (CEL)

Cybersecurity Elastic Laboratory (CEL)

CEL specialize in providing top-tier services in vulnerability diagnosis and penetration testing, offering a comprehensive suite of solutions to mitigate cyber risks.