News

2018-06-28

How to Measure Cybersecurity Success

When performance is measured, performance improves. When performance is measured and reported, the rate of improvement accelerates.

2018-06-27

13 Ways Cyber Criminals Spread Malware

A search of darknet forums reveals a wide range of techniques used by criminal hackers to spread malware, steal data and plant crypto ransomware.

2018-06-27

A Guide To Addressing Corporate IoT Security

What can enterprises do to strengthen the security of their IoT environments? Here are some suggested best practices from industry experts.

2018-06-28

Former UK Spy Boss Say Russia Is 'live testing' Cyber-Attacks

The problem posed by nation state attackers has increased over the last five years and become an issue for enterprises as well as governments.

2018-06-27

Ukraine Says Russian Hackers Are Preparing A Massive Strike

Hackers from Russia are infecting Ukrainian companies with malicious software to create “back doors” for a large, coordinated attack.

2018-06-26

Chinese Hack Breached US Satellites

Hackers infected computers controlling critical US communications satellites, so that they could change orbital positions and disrupt data traffic.

2018-06-26

German Nuclear Plant Infected With Viruses

The RWE Gundremmingen nuclear plant, located northwest of Munich, has been found to be infected with computer viruses. But don't worry....

2018-06-26

BMW Cars Can He Hacked

Fast Forward: An in-depth analysis of various systems present in BMW cars has discovered 14 locally and remotely exploitable vulnerabilities.

2018-06-25

White Hat To Combat Cyber-Attacks

The Israeli National Cyber Security Authority is sub-contracting protection of critical infrastructure, sector by sector.

2018-06-25

Blockchain v World Cup – It Could Go To Penalties…

TV Adverts promoting Blockchain start-up Hdac are premature and possibly misleading about the current actual capability of the technology.

2018-06-25

China’s Electronic Surveillance Program Targets Muslims

China has created one of the world’s most sophisticated state surveillance systems to target the predominantly Muslim Uighur ethnic minority.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Advent IM

Advent IM

Advent IM is one of the UK’s leading independent cyber security specialists, with a unique approach to providing holistic security management solutions.

enSilo

enSilo

enSilo secures customers data on premise or in the cloud. Regardless of the where the threat comes from, enSilo can protect your data.

vdiscovery

vdiscovery

vdiscovery is a provider of proprietary and best-in-breed solutions in computer forensics, document review, and electronic discovery.

Evidence Talks Ltd

Evidence Talks Ltd

A leading forensic computing authority developing unique digital forensic technologies. Tools that detect potential terrorists & criminals & used by the military, enforcement & intelligence commmunity

Bird & Bird

Bird & Bird

Bird & Bird is an international law firm with a focus on helping organisations being changed by technology and the digital world. Areas of expertise include cyber security.

Span

Span

Span designs, develops and maintains information systems based on advanced technological solutions of global IT leaders.

Randori

Randori

Randori is an attack platform that provides "red-teaming" as a service - basically, staging simulated hack attacks to test for vulnerabilities and gaps in the security response.

HumanFirewall

HumanFirewall

HumanFirewall makes it possible for every individual to take part in securing their organisation. With HumanFirewall, achieving security has never been easier.

Sky Republic

Sky Republic

Sky Republic offers a Smart Contract Platform to integrate and synchronize business networks beyond EDI and API.

DataDog

DataDog

DataDog provides Cloud-native Security Monitoring. Real-time threat detection across your applications, network, and infrastructure.

MVP Tech

MVP Tech

MVP Tech designs and deploys next generation infrastructures where Security and Technology converge.

Noname Security

Noname Security

Noname Security detects and resolves API vulnerabilities and misconfigurations before they are exploited.

Coretelligent

Coretelligent

Coretelligent is a leading providers of Managed and Co-Managed IT, cybersecurity and private cloud services.

Marcum Technology

Marcum Technology

Marcum Technology consultants are focused on helping you reach your company’s full potential by exploring creative ways to integrate tomorrow’s technology into your business today.

Verizon

Verizon

Verizon is a leader in IT technology solutions - Verizon Cloud, Networking, Security, Mobility, Machine-to-Machine (M2M), Advanced Communications and Professional Services.

Theta

Theta

Theta is a New Zealand owned technology consultancy. Our team of over 330 experienced professionals help organisations transform with technology.