News

2017-05-09

Artificial Intelligence Is A Fascist's Dream

As AI becomes more powerful, people need to make sure it’s not used by authoritarian regimes to centralise power & target certain populations.

2017-05-09

Big Data Tech Alters Homeland Security

The market for Big Data & Data Analytics products for use in Homeland Security is growing fast and will be worth $11 Billion by 2022.

2017-05-03

Cyber Warfare - Alleged Failures Of North Korean Missile Launches

Is it possible that some malware could sit in a North Korean missile system that only becomes active when it is launched in the direction of Japan?

2017-05-10

Terrorism Prevention & Border Protection – New Face Recognition Platform

Using unique feature recognition capabilities, FaceFirst's new airport security platform identifies visitors in high traffic areas.

2017-05-08

Police Take To The Air With Connectivity

Highly secure internet connectivity lets US Police tactical flight officers connect to communications systems and databases while airborne.

2017-05-05

You Should Read LinkedIn's New Privacy Policy Carefully

The Small Print: Are you are sharing information that might violate your employer’s default confidentiality agreement?

2017-05-08

How A Cyber Attack Transformed Estonia

Cyber Attacks. Information Warfare. Fake News: Estonia was among the first countries to come under attack from modern hybrid warfare.

2017-05-03

Hacker Holds Netflix To Ransom

A hacker claims to have stolen the upcoming season of Netflix’s hit series 'Orange is the New Black' and is demanding a ransom payment.

2017-05-05

US vs. North Korea Cyberwar Underway

It seems highly likely that an innovative and highly secretive cyber war is underway with implications for critical infrastructure.

2017-05-03

Cyber Should Be Standalone Insurance

Treating cyber risk as a standalone insurance risk promises to unlock the potential for meaningful coverage for both insurers & buyers.

2017-05-03

Intelligence Agency Backs Start-Up Spy Apps

The US Defense Intelligence Agency has a new approach to acquisition and software development that looks a lot like Silicon Valley's.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Pondurance

Pondurance

Pondurance is an IT Security and Compliance company providing services in Cyber Security, Continuity, Compliance and Threat Management.

Jetico

Jetico

Jetico provides pure & simple data protection software for all sensitive information throughout the lifecycle. Solutions include data encryption and secure data erasure.

Apricorn

Apricorn

Apricorn provides hardware-based 256-bit encrypted external storage products to companies and organizations that require high-level protection for their data at rest.

StackRox

StackRox

StackRox delivers a container-native security platform that adapts detection and response to new threats.

Data443 Risk Mitigation

Data443 Risk Mitigation

Data443 Risk Mitigation provides next-generation cybersecurity products and services in the area of data security and compliance.

Lepide

Lepide

LepideAuditor is a powerful Data Security Platform that enables you to reduce risk, prevent data breaches and prove regulatory compliance.

IAmI Authentications

IAmI Authentications

IAmI is a first in Tokenization Cloud-based IAM Security Services, delivering the most advanced form of Two-Factor Authentication.

Intercast Global

Intercast Global

Intercast's mission is to be a strategic resource to our clients in Risk Reduction. We are a global leader in cyber security staffing and consulting to the enterprise.

Visible Statement

Visible Statement

Visible Statement is a computer-based delivery system designed to insure the retention and recall of your most important security training messages.

WiebeTech

WiebeTech

WiebeTech’s line of digital forensics tools provide innovative and rugged devices for efficient disk imaging and evidence capture.

Patriot Consulting Technology Group

Patriot Consulting Technology Group

Patriot Consulting's mission is to help our clients manage cybersecurity risk through secure deployments of Microsoft 365.

SHI International

SHI International

SHI International deliver against your IT and business needs, helping you build strategies and solutions that will drive innovation, collaboration and security.

Atlas VPN

Atlas VPN

Atlas VPN is a highly secure freemium VPN service with a goal to make safe and open internet accessible for everyone.

Metallic.io

Metallic.io

Metallic (formerly TrapX) is a SaaS portfolio for enterprise-grade backup and recovery, designed to protect your data from corruption, deletion, ransomware, and other threats.

Prembly

Prembly

Prembly are a compliance and security infrastructure company.

Nuke From Orbit

Nuke From Orbit

Nuke's mission is to put you back in control of your digital identity when your smartphone gets stolen.