News

2018-03-09

Artificial Intelligence Is Cyber Defence

AI can help spot trends, patterns and anomalies in data that the naked eye cannot discern to identify and mitigate proliferating new types of malware.

2018-03-07

Cybercriminals Use Fake Websites

Criminal tricks include websites disguised as crypto-currency exchanges or fake services offering cloud mining. But the users always lose their money.

2018-03-13

Does Fake News Affect Threat Intelligence?

The concept of ‘fake news’ has plagued media for the past couple of years, but what is its impact upon business-level cybersecurity?

2018-03-12

Autonomous Cars Hit The Road In California

Look - No Hands: Tech companies and others working on driverless vehicle systems will begin trialling their cars without a safety driver present.

2018-03-09

Russian Hacker False Flags Work - Even After They're Exposed

False Flag identities for nation-state hackers are just as standard a part of the toolkit as phishing links and infected Microsoft Office attachments.

2018-03-08

Bill Gates Says Cryptocurrencies Are Deadly

Bill Gates is concerned by cryptocurrency, saying that the anonymity offered by the new technology has “caused deaths in a fairly direct way”.

2018-03-15

Real Dangers of Artificial Intelligence

Every AI advance by the good guys is also an advance for the bad guys, according to a panel of academic experts, warning of its malicious use.

2018-03-15

Russia Has Lasers To Shoot Satellites

Russian defense companies have created a plane-mounted laser that can hit satellites, to achieve "destruction of those elements deployed in orbit.”

2018-03-07

Cybercime Against UK Business Is Up 63%

UK Office for National Statistics reports that incidents involving computer misuse and malware against business are significantly up.

2018-03-14

The Mysteries Of Crypotocurrencies

No aspect of the crypto-currency and blockchain space has been as poorly understood as the initial coin offering (ICO). Regulators want clarity.

2018-03-12

Cyber Criminals Catch Up With Nation-States

The trickle-down effect of advanced “military-grade” tools is seeing the gap between cyber-criminal & nation state attack capabilities closing.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Lantronix

Lantronix

Lantronix is a global provider of secure data access and management solutions for Internet of Things (IoT) and information technology assets.

Trend Micro

Trend Micro

Trend Micro is a leader in hybrid cloud, endpoint, and network security solutions.

Lynx Software Technologies

Lynx Software Technologies

Lynx provide secure software and operating systems for use in mission critical applications such as aerospace, medical, transportation and IoT.

ACI Solutions

ACI Solutions

ACI Solutions is a managed IT services and network security provider working with diverse global commercial, government and public sector clients.

ThreatMark

ThreatMark

ThreatMark provides fraud detection solutions for digital banking and payments.

Custodio Technologies

Custodio Technologies

Custodio Technologies was established as a Singaporean R&D Centre of Israel Aerospace Industries (IAI) in order to spearhead R&D activities in the field of cyber early warning.

Invest Ottawa

Invest Ottawa

The IO Accelerator Program is designed to rapidly and systematically accelerate the development and commercial success of high growth technology firms.

Eaton

Eaton

Eaton provides comprehensive cybersecurity services for operational technology (OT) to help keep your operations and personnel safe.

Vietnamese Security Network (VSEC)

Vietnamese Security Network (VSEC)

Vietnamese Security Network (VSEC) is an information security company providing website vulnerability scanning and monitoring services.

Strike Graph

Strike Graph

The Strike Graph GRC platform enables Security Audits & Certifications.

Valence Security

Valence Security

Valence manages and secures your Business Application Mesh by delivering visibility, reducing unauthorized access and preventing data loss.

CybersCool Defcon

CybersCool Defcon

CybersCool is committed to educate and train, re-skill and up-skill the current workforce of various industries and businesses in the knowledge and know-how of cybersecurity.

Surfshark

Surfshark

Surfshark is a cybersecurity company focused on developing humanized privacy & security protection solutions to secure people's digital lives.

SecOps Group

SecOps Group

SecOps Group is a boutique cybersecurity consultancy helping enterprises identify & eliminate security risks on a continuous basis.

ExtraHop

ExtraHop

ExtraHop's dynamic cyber defense platform uses cloud-scale AI to help enterprises detect and respond to advanced threats - before they compromise your business.

WIIT Group

WIIT Group

WIIT Group are focused on a single goal: securing our clients’ critical processes and enabling them for digital transformation.