News

2017-07-26

Key Concepts For Understanding Artificial Intelligence

AI has innovative uses across all industry segments, helping diagnose and solve problems faster and enabling consumers to do amazing things.

2017-07-26

US Steps Up Its Cyberwar Capability

The NSA and Cyber Command to separate, reforming the chain of command for defensive & offensive cyber operations to combat IS and other foes.

2017-07-26

Australia Wants Technology Businesses To Act On Extremism

Australian PM tells Internet companies to move faster to remove extremist content and to address the “problem” of encrypted messages.

2017-07-26

Predicting Crime From Open Source Data

The criminal justice system produces reams of data and a new crime prediction technology is being deployed that is transforming policing.

2017-07-25

Can We Stop Algorithms Telling Lies?

Most important moments where people interact with large bureaucratic systems involve an algorithm in the form of a scoring system. That's a problem.

2017-07-24

Global Cyber Attack Could Cost $53Billion.

Insurance experts at Lloyds calculate that the cost of a major cyber attack would equal the economic losses from a catastrophic natural disaster.

2017-07-24

Dark Web Marketplaces Shut Down

AlphaBay and Hansa, two of the largest “dark web” marketplaces for illegal and illicit items such as drugs and guns, have been shut down.

2017-07-25

Cyber Warfare Takes A New Turn

The recent ransomware attacks are masking a bigger issue in cyberwar - which is that chaos and disruption on the Internet are the new normal.

2017-07-25

The Impact Of AI On Employment Demands New Thinking

The challenge of protecting traditional jobs from the impact of globalisation will be further complicated by the effects of AI and automation.

2017-07-19

US Needs To Get Its Data Ready For GDPR

The GDPR harmonises data privacy laws, empowers EU citizens’ data privacy and will reshape organisations' approach to data privacy.

2017-07-25

Guide to Russian Infrastructure Hacking

Which of the numerous Russian hacker groups has been attempting to hack the US power generation infrastructure?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Social-Engineer

Social-Engineer

Social-Engineer is a team of outside–the–box thinkers that share a common focus on human-to-human social engineering.

Intland Software

Intland Software

Intland offer an integrated Application Lifecycle Management platform that offers all-round Requirements, Development, and Testing & Quality Assurance functionality.

Chubb

Chubb

Chubb is the world’s largest publicly traded property and casualty insurer. Commercial services include Cyber Risk insurance.

Keyfactor

Keyfactor

Keyfactor is a leader in cloud-first PKI as-a-Service and crypto-agility solutions. Our Crypto-Agility Platform seamlessly orchestrates every key and certificate across the enterprise.

VNCERT

VNCERT

VNCERT is the national Computer Emergency Response Team for Vietnam.

StormWall

StormWall

StormWall is an Anti-DDoS protection service for websites and networks. We offer 100% protection from all types of DDoS attacks and 24/7 technical support.

Veriff

Veriff

Veriff provides highly-automated identity-verification services that prevent fraud like nothing else on the market.

Open Connectivity Foundation (OCF)

Open Connectivity Foundation (OCF)

OCF is dedicated to ensuring secure interoperability ensuring secure interoperability of IoT for consumers, businesses and industries.

Seavus Accelerator

Seavus Accelerator

Seavus Accelerator's goal is to create an enabling and stimulating environment for start-ups growth and provide continuous high quality acceleration and investment support.

Code Intelligence

Code Intelligence

Code Intelligence offers a platform for automated software security testing to help developers make their software more robust and secure.

iSPIRAL IT Solutions

iSPIRAL IT Solutions

iSPIRAL is a leading regulatory technology software provider delivering state-of-art AML, KYC, Risk and Compliance solutions.

Hackurity.io

Hackurity.io

Hackurity.io is a high energy IT security start-up founded in 2021 out of the frustration that IT Security is highly fragmented and reactive.

SecurityStudio

SecurityStudio

SecurityStudio is a continuous cybersecurity risk management platform that allows decision-makers to quickly identify the most immediate threats and make confident risk informed decisions.

Cybastion

Cybastion

Cybastion develops robust world-class cybersecurity solutions tailored to suit the needs of different businesses, governments and public sector entities.

Cakewalk

Cakewalk

Cakewalk is the new standard in easy Access Control. Trusted by IT & Security teams. Loved by employees.

GlassHouse Technology

GlassHouse Technology

GlassHouse supports customers in their digitalization journey with our deep technical expertise in Managed Cloud and Security Services, SAP Infrastructure Service and Business Continuity Services.