News

2017-05-23

Uber Faces A Criminal Probe In The US

Ride-sharing firm Uber firm is accused of using "secret" software that lets it operate in regions where its service is banned or restricted.

2017-05-22

The Difference Between Cyberspace & The Internet

The two terms are sometimes used interchangeably, although they have different meanings.

2017-05-22

Cybersecurity Has A Serious Talent Shortage

Businesses should open themselves up to applicants whose non-traditional backgrounds mean they could bring challenging new ideas.

2017-05-19

EU Nations Expand Their Cyber Defences

More EU countries are working on strengthening their national security and cyber defence infrastructure.

2017-05-19

Police Innovative Reporting Technology

A new documentation and report system brings highly customised dictation and documentation capabilities to police officers on the move

2017-05-19

Major Defence Company Adopts Blockchain

Lockheed Martin is to integrate blockchain cyber security technology into systems engineering , supply chain & software development.

2017-05-18

UK Proposes Online Surveillance In Real-Time

The "live" surveillance of British web users' internet communications is proposed in a draft technical paper prepared by the UK government.

2017-05-17

Bank Data Breaches Are Up And It's An Inside Job

Bank breaches are not always due to legacy operating systems or their inability to cope with new forms of cyber attacks. There is human error.

2017-05-16

Threat Intelligence Starter Resources

Creating a threat intelligence capability can be a challenging undertaking and not all companies are ready for it.

2017-05-16

Germany May Go Offensive After Russian Cyber Attacks

German security chief wants the legal authority to "wipe out" servers the Russian government used to deploy cyber attacks against Germany.

2017-05-16

Global C4ISR Has A Cyber Warfare Surge

C4ISR refers to Command, Control, Communications, Computers, Intelligence, Surveillance & Reconnaissance. It's a growing market.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

iStorage

iStorage

iStorage is the leading global provider of PIN Activated, hardware encrypted, portable data storage solutions.

Evidian

Evidian

Evidian, a Bull Group company, is the European leader and one of the major worldwide vendors of identity and access management software.

APWG

APWG

APWG is the international coalition unifying the global response to cybercrime across industry, government, law-enforcement and NGO communities.

evoila

evoila

evoila GmbH is one of the leading providers in consulting, analysis, implementation and management of cloud infrastructure.

ReversingLabs

ReversingLabs

ReversingLabs develops cyber threat detection and mitigation tools that address the the latest directed attacks, advanced persistent threats and polymorphic malware.

SecuDrive

SecuDrive

SecuDrive, provides hardware encrypted external storage devices to protect a company’s sensitive and important data.

Echoworx

Echoworx

Echoworx primary and exclusive focus is providing organizations with secure email services.

Pipeline Security

Pipeline Security

Pipeline is a leader in cybersecurity, offering comprehensive services to protect organizations from evolving threats.

About Cyber Security.

About Cyber Security.

About Cybersecurity provides a galaxy-wide knowledge base of cybersecurity tactics and techniques derived from actual experience.

Aversafe

Aversafe

Aversafe provides individuals, employers and certificate issuers around the world with a first line of defense against credential fraud.

Avalanchio Technologies

Avalanchio Technologies

The Avalanchio platform gives you a complete solution to collect, process, and analyze security data to detect threats in real-time and analyze historical data using security DSL or SQL.

Condition Zebra

Condition Zebra

Condition Zebra has wide experience in providing IT Security Services, Training, and Certification in the field of cybersecurity.

Zokyo

Zokyo

Zokyo is a venture studio that builds, secures, and funds legendary web3/crypto businesses.

Department of Homeland Security (DHS)

Department of Homeland Security (DHS)

The Department of Homeland Security has a vital mission: to secure the nation from the many threats we face. Our duties are wide-ranging, but our goal is clear - keeping America safe.

Cryptr

Cryptr

Cryptr provides plug and play authentication to manage all your authentication strategies in one place with just a few lines of code.

CyberTest

CyberTest

CyberTest offers cybersecurity consulting and penetration testing services that helps organizations and businesses securing their assets.

Inholo

Inholo

Inholo offers tools to manage the risks of synthetic realities, starting with an AI-photo detection service.