News

2017-03-07

Twitter Gains 2m Users But Loses $457m

Although Twittter's current significance in electoral politics is unquestioned, the social media platform's business model is under scrutiny.

2017-03-06

Banks Around The World Hit With Fileless Malware

Kaspersky Lab researchers have brought to light a new series of attacks against 140 plus banks and other businesses around the world.

2017-03-06

Facebook Wants To Eliminate Racially Targeted Advertising

Facebook has updated its advertising policies to ban discrimination based on personal characteristics - race, ethnicity, sexuality or age.

2017-03-03

‘Cyber War’ Is Fast Becoming Just ‘War’

The next great conflict will play out not just on physical terrain but also in the electrical pulses of cyberspace and the electronic spectrum.

2017-03-01

Fake Microsoft Phishing Scam

Access to your Microsoft Email Account Disabled? A campaign of fraudulent messages designed to capture your online identity via a fake website.

2017-02-15

Who Owns The Data From The IoT?

Many organisations are beginning to monetise information and to pass their IoT data to third parties. But who owns it and is it theirs to sell?

2017-02-10

Fallout In Russia : One Suspicious Death & Three Cyber Spies Arrested

There is a purge of the Russian espionage establishment in progress and it has something to do with the election of President Trump.

2017-02-10

Yahoo Spins A Cautionary Tale Dealing With Data Privacy

Why did it take so long for the Yahoo! hack to come to light? Opinion by Emily Taylor & Joyce Hakmeh

2017-02-09

GCHQ Is Investing In Cybersecurity Start-Ups

The UK's intelligence agency GCHQ is backing a new hub for tech start-ups in a rare glimpse into its approach to cybersecurity.

2017-02-13

Hologram Technology Is Finding Military Users

Microsoft’s HoloLens hologram headset systems are already being used in the Australian, Ukrainian and Israeli armies.

2017-03-01

Suspect Monitoring & Surveillance Technology

NEC Are Looking Out For Criminal Activity: Monitoring and analysing suspicious behavior has become a pressing need for law enforcement.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Foundation for Strategic Research (FRS)

Foundation for Strategic Research (FRS)

The Foundation for Strategic Research is France's main independent think tank on strategic, defense and security issues. Cyber security is covered as part of the study areas.

Syhunt Security

Syhunt Security

Syhunt is a leading player in the web application security field, delivering its assessment tools to a range of organizations across the globe.

Nozomi Networks

Nozomi Networks

Nozomi Networks is a leader in Industrial Control System (ICS) cybersecurity, with a comprehensive platform to deliver real-time cybersecurity and operational visibility.

TCDI

TCDI

TCDI specializes in computer forensics, eDiscovery and cybersecurity services.

Consistec Engineering & Consulting

Consistec Engineering & Consulting

Consistec Engineering & Consulting GmbH is an information technology and services company offering solutions for monitoring the security of IT and OT infrastructure.

Kingston Technology

Kingston Technology

Kingston is a leading global manufacturer of memory and storage solutions including encrypted storage solutions to protect data inside and outside the firewall.

Tailscale

Tailscale

Tailscale is a VPN service that makes the devices and applications you own accessible anywhere in the world, securely and effortlessly.

Nasuni

Nasuni

The Nasuni File Data Platform offers the protection, detection, and recovery of file shares from ransomware attacks or random disasters within minutes.

Pulsant

Pulsant

Pulsant is the UK’s premier digital edge infrastructure company providing next-generation cloud, colocation and connectivity services.

PixelQA

PixelQA

Are you looking for a security testing company to cross-check whether your software or mobile app has a possible security threat or not?

Theta

Theta

Theta is a New Zealand owned technology consultancy. Our team of over 330 experienced professionals help organisations transform with technology.

ABPCyber

ABPCyber

ABPCyber offers holistic cybersecurity solutions spanning DevSecOps, advisory and consultancy, designing and integration, managed operations, and cybersecurity investment optimization.

Tyto Athene

Tyto Athene

At Tyto Athene, we harness the power of technology to provide solutions that shape the future.

Secure Cyber Management

Secure Cyber Management

Secure Cyber Management provides industry-leading cloud security advice, guidance and services.

CelcomDigi

CelcomDigi

CelcomDigi aspire to be Malaysia’s top Telco-Tech company, transforming beyond core connectivity to lead digitalization and innovation as part of nation-building.

Dialog Enterprise

Dialog Enterprise

Dialog Enterprise is the corporate ICT solutions arm of Dialog Axiata, Sri Lanka’s leading connectivity provider.