News

2017-10-12

More Sensitive US Voter Records Leaked

Alaskan Voters AWOL: A cache of voter records on over a half-million US citizens has been found posted online.

2017-10-12

In Demand: New Tech Against Drone Attacks

Critical infrastructure and public security are highly exposed to the threat of drone attacks and this is a big concern for law enforcement worldwide.

2017-10-12

Russia’s Digital Weapons Refined Against Ukraine

Russia is developing and refining a generation of powerful new cyber weapons by experiment on neighbouring Ukraine.

2017-10-11

Kaspersky Says We Can Trust Him

Eugene Kaspersky denies that firm he founded is too close to the Russian government and insists it poses no danger to its American customers.

2017-10-11

Preventing The Hacked AI Apocalypse

As attacks are an increasingly worrisome threat to the performance of artificial intelligence applications, can AI be trusted?

2017-10-02

Equifax Executives Resign Without Charge

After an estimated 143 million Americans' personal information was accessed by hackers targeting Equifax Inc. the CIO and CSO step down.

2017-10-10

Transforming Your Database

The love affair with the big matrix of bits is slowly fading as developers are realizing that not everything fits into a simple table.

2017-10-09

A 9-Step Guide For GDPR Compliance

In May 2018, the General Data Privacy Regulation will take effect, significantly altering the way organisations handle and store data. Be prepared.

2017-10-09

British Police’s First Cyber Dogs

Police are using the detection dogs to track down computer software hidden in homes of suspected sex offenders.

2017-10-02

Facebook To Give Congress Thousands Of Election Ads Bought By Russians

Full Disclosure: Facebook will provide US Govt. thousands of ads purchased by Russians during the 2016 US presidential race.

2017-10-09

Iranian Hackers Linked To Malware

Iran has earned a reputation for aggressive state-sponsored hacking, stealing data from corporate and government networks around the world.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Council of Europe - Cybercrime Programme Office (C-PROC)

Council of Europe - Cybercrime Programme Office (C-PROC)

The Cybercrime Programme Office of the Council of Europe is responsible for assisting countries worldwide in strengthening their legal systems capacity to respond to cybercrime

Telesoft Technologies

Telesoft Technologies

Telesoft Technologies is a global provider of cyber security, telecom and government infrastructure products and services.

i-Sprint Innovations

i-Sprint Innovations

i-Sprint is a leader in Securing Identity and Transactions in the Cyber World for industries that are security sensitive.

CETIC

CETIC

CETIC is an applied research centre in the field of ICT. Key technologies include Big Data, Cloud Computing, the Internet of Things, software quality, and trust and security of IT systems.

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory is a manufacturer of military security and data destruction equipment for sensitive, classified, and secret information.

101 Blockchains

101 Blockchains

101 Blockchains is a professional and trusted provider of enterprise blockchain research and training.

HITRUST Alliance

HITRUST Alliance

HITRUST provides widely-adopted common risk and compliance management frameworks, related assessment and assurance methodologies.

RocketCyber

RocketCyber

RocketCyber is a Managed SOC platform empowering Managed Service Providers (MSPs) to deliver security services to small and medium businesses.

MillenniumIT ESP (MIT ESP)

MillenniumIT ESP (MIT ESP)

MillenniumIT ESP provides solutions and services around Core Infrastructure, Cloud, Cyber Security, Enterprise Applications, Intelligent Automation and Data, Smart Buildings, and Managed Services.

Zaviant Consulting

Zaviant Consulting

Zaviant Consulting is a leading data security and privacy consulting firm assisting organizations comply with constantly evolving security frameworks and privacy regulations.

6WIND

6WIND

6WIND deliver virtualized, cloud-native, distributed high performance & secure networking software solutions to support new applications such as 5G, IoT, SD-WAN.

Onwardly

Onwardly

For everyday folks tasked with implementing security and privacy. Do it faster with Onwardly - build, launch and scale your cyber resilience program in 30 minutes per week.

Calamu

Calamu

Calamu is a software-defined storage security and resiliency platform that keeps your data secure and accessible wherever you choose to store it.

BCX

BCX

BCX, a subsidiary within Telkom Group, is one of Africa’s largest systems integrator and digital transformation partners for enterprises and public sector organisations.

Eclypses

Eclypses

Eclypses has a disrupting cyber technology, offering organizations an advanced data security solution called MicroToken Exchange (MTE).

WillCo Tech

WillCo Tech

WillCo Tech works to enhance national security and force readiness for military and commercial enterprises with a suite of software capabilities surrounding the human element of cybersecurity.