News

2018-01-31

World's Biggest Ever Digital Currency Theft

One of Japan's largest digital currency exchanges says it has lost some $534m (£380m) worth of virtual money in a hacking attack on its network.

2018-02-06

Russia's New Generation Of Military Robots

Russian defence technology is inching ahead of its competition in designing, testing & deploying a wide variety of unmanned systems harnessing AI.

2018-02-01

Spy vs Spy - Cozy Bear Hackers Hacked

Dutch intelligence were the first to alert US agencies about the Russian hack of DNC after penetrating the Cozy Bears' servers and CCTV.

2018-02-03

AI Can Turn Hollywood Stars Into Pornographic Actors

The sex industry is turning to advanced machine learning technology to create fake pornography featuring legitimate actors and celebrities.

2018-02-05

Facebook & Google Are ‘A Menace to Society’

Facebook and Google have become “obstacles to innovation” and are a “menace” to society whose “days are numbered”.

2018-02-06

Prime Minister Wants A 'fake news' Rapid Response Team

British Prime Minister Theresa May wants a "fake news" rapid response unit to monitor social media and challenge false stories.

2018-02-09

Killer Robots Will Be Ubiquitous In The US Army

In future, every US combat vehicle is going to have the capability to be robotic and to deliver 'solid lethality'.

2018-02-07

High Tech Police Tool Up For Winter Olympics

S. Korea is planning to deploy 10,000 police officers in and around Pyeongchang to protect the events against cyber attacks & other disruption.

2018-02-06

Alphabet Launches A Cybersecurity Company - Chronicle

Alphabet, the parent company of Google, Nest, Waymo, and many other companies, is launching a cybersecurity startup.

2018-02-07

Drones: A Crowd-Management Solution

India is working on crowd-management solutions in public places using drones for both crowd management and infrastructure inspection.

2018-01-30

In S.Africa The Cybersecurity Skills Gap Is A Chasm

South Africa has seen a steady rise in cyber-crime, jumping to rank as the 3rd most cyber attacked country in the world. The situation is dire.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

World Privacy Forum (WPF)

World Privacy Forum (WPF)

The World Privacy Forum is a non-profit public interest research group that focuses on privacy and technology issues.

Portnox

Portnox

In 2007, Portnox set out to create one of the world’s easiest to use, most loved, value-driven network security solutions — and our customers will tell you we’ve succeeded.

Centre for Cyber Security (CFCS) - Denmark

Centre for Cyber Security (CFCS) - Denmark

The Centre for Cyber Security is the Danish national IT security authority, Network Security Service and Centre for Excellence within cyber security.

Visual Guard

Visual Guard

Visual Guard is a modular solution covering most application security requirements, from application-level security systems to Corporate Identity and Access Management Solutions.

State e-Government Agency (SEGA) - Bulgaria

State e-Government Agency (SEGA) - Bulgaria

The State e-Government Agency (SEGA) is responsible for matters relating to electronic governance in Bulgaria.

Genians

Genians

Genians provides the industry’s leading Network Access Control (NAC) solution, which ensures full visibility of all IP-enabled devices regardless of whether they are wired, wireless, or virtual.

Sompo International

Sompo International

Sompo International is a global specialty provider of property and casualty insurance and reinsurance services including Cyber & Network Risk.

Fudo Security

Fudo Security

Fudo Security is a leading provider of privileged access management and privileged session monitoring solutions.

KanREN

KanREN

KanREN is a member based consortium offering custom, world-class network services and support for researchers, educators, and public service institutions in the state of Kansas.

Comcast Business

Comcast Business

Comcast Business keeps businesses ready for what’s next with powerful connectivity, advanced cybersecurity solutions, and the right people at your side.

BlockSec

BlockSec

BlockSec is dedicated to building blockchain security infrastructure. The team is founded by top security researchers and experiencedexperts from both academia and industry.

Digital Intelligence

Digital Intelligence

Digital Intelligence offer a full array of products, forensic and e-discovery consulting services and training.

CatchProbe Intelligence Technologies

CatchProbe Intelligence Technologies

CatchProbe provides actionable web intelligence, OSINT, deception systems, threat intelligence, and digital crime analytics solutions and products through an AI-Driven intelligence platform.

IONIX

IONIX

IONIX (formerly Cyberpion) is the attack surface management solution that uses Connective Intelligence to shine a spotlight on exploitable risks across your supply chain.

Flow Security

Flow Security

Enterprises run on data, Flow secures it at runtime. With a runtime-first approach, Flow is a game-changer in the data security space, securing data itself, beyond the infrastructure it resides in.

Atlas Systems

Atlas Systems

Atlas Systems helps companies large and small accelerate their digital transformation journeys – expanding their capabilities and delivering tailored solutions including cybersecurity.