News

2017-09-18

Wearable Sensor Tech For Beat Police Officers

A new wearable sensor technology named Automatic Injury Detection (AID) provides on the spot rescue alerts when a police officer needs help.

2017-09-19

Canadian University Hit For $12m Phishing Scam

MacEwan University said its IT systems are secure after the institution was defrauded of nearly $12 million in a phishing scam, compounded by human error.

2017-09-13

WikiLeaks: The Biter Bit

WikiLeaks suffered an embarrassing cyber attack when Saudi Arabian-based hacking group OurMine took over its web address.

2017-09-14

Brit Accused of Bank Cyber Attacks

A British / Israeli man accused of launching cyberattacks against two of the UK's largest banks has appeared in court.

2017-09-19

The IoT Will Bring Cyberwar Close To Home

Industrial & military control systems are considered the targets in cyberwarfare, but a consequence of IoT will be to bring the battle into our homes.

2017-09-13

Will The CIA Be Run By Robots…?

The intelligence community has been eyeing artificial intelligence and machine learning to replace the routine tasks analysts perform.

2017-09-13

Essentials: A Cybersecurity Strategy For Healthcare

Hospitals and health systems need to make sure their cybersecurity strategies are primed to keep them ahead of the threats.

2017-09-18

Cyber Vulnerability Affecting 745,000 Pacemakers

Three quarters of a million implanted heart pacemakers are confirmed as having cybersecurity issues that could allow them be hacked.

2017-09-19

What Is The Stuxnet Worm?

Stuxnet is a computer worm that targets industrial control systems to inflict damage, but is most famous for being the first genuine cyber-weapon.

2017-09-18

Which Countries Are Ready For Cyberwar?

Including the usual suspects, over 30 countries are developing offensive cyber-attack capabilities, although their programmes are shrouded in secrecy.

2017-09-18

S. Africa’s Model For Cybesecurity

S. African organisations can no longer afford to operate in isolation in the process era of the 4th Industrial Revolution.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cyber Security Network

Cyber Security Network

Cyber Security Network provide specialist cyber security recruitment services.

Owl Cyber Defense

Owl Cyber Defense

Owl patented DualDiode Technology enables hardware-enforced network segmentation and deterministic, one-way transfer of all data types and file sizes.

Engineering Group

Engineering Group

Engineering is the Digital Transformation Company, a leader in Italy and with over 80 offices across Europe, the United States, and South America.

Adlink Technology

Adlink Technology

ADLINK is a leading provider of embedded computing products and services for applications including IoT and industrial automation.

Careers in Cyber Security (CiCS)

Careers in Cyber Security (CiCS)

CareersinCyberSecurity is a leading global job board and career resource for Cyber Security, IT Audit, Technology Risk and Data Protection professionals.

Modux

Modux

Modux focus on a number of core competencies across cyber security including; cyber intelligence & analytics, penetration testing and training.

Cyber Academy

Cyber Academy

Cyber Academy is one of the first institutions in the SE Europe region that provides a hands-on program in cyber security, blockchain and AI.

Netlawgic Legal Services

Netlawgic Legal Services

Netlawgic is exclusively focused on delivering cyber law solutions to the industry. We provide our clients with specialized attention and problem solving in all aspects of cyber law.

Mendoza Ventures

Mendoza Ventures

Mendoza Ventures is a venture capital fund focusing on pre-seed Artificial Intelligence (AI), Fintech, and Cybersecurity startups.

Bellvista Capital

Bellvista Capital

Bellvista Capital connects entrepreneurs with capital and unmatched business expertise in the technology areas of Cloud Computing, Cyber Security and Data Analytics.

NSA Career Development Programs

NSA Career Development Programs

NSA offers entry-level programs to help employees enhance their skills, improve their understanding of a specific discipline and even cross-train into a new career field.

Tangible Security

Tangible Security

Tangible employs the most sophisticated cyber security tools and techniques available to protect our clients’ sensitive data, infrastructure and competitive advantage.

Internet Crime Complaint Center (IC3)

Internet Crime Complaint Center (IC3)

The Internet Crime Complaint Center provide the public with a reporting mechanism to submit information to the FBI concerning suspected Internet-facilitated criminal activity.

Quside

Quside

Quside, a spin-off from The Institute of Photonic Sciences in Barcelona, designs and manufactures innovative quantum technologies for a wide range of applications including cyber security.

Cognisys Group

Cognisys Group

Cognisys provides cyber security penetration testing and compliance services from its offices in Leeds and Manchester.

Rescana

Rescana

Rescana offers a cyber risk management platform with the vision to remove the security team bottlenecks, accelerating business processes that require risk assessment.