News

2017-01-19

Obama’s Cyber Legacy

Cyberspace was President Obama’s most unpredictable adversary, taking new directions & delivering blows where least expected.

2017-01-19

One Million Say Pardon Snowden & Russia Says He Can Stay Two More Years

Obama's Final Acts: No pardon for Edward Snowden who can safely remain in Russia, while Chelsea Manning is released from jail early.

2017-01-20

Yahoo’s Big Breach Is A Catalyst for Change

Yahoo’s latest security breach where hackers stole personal details from a billion users has the potential to become the biggest attack in history.

2017-01-18

Cyber Criminals Target African Banks

African nations' efforts to tackle cybercrime are gaining momentum as cyber criminals target them with ransomware.

2017-01-17

Canadian Police Investigating Hydro Cyberattack

A cyber-attack on an archaic, unused IP address at Hydro One could be part of a broader hacking campaign, security experts say.

2017-01-23

Robots Will Take Our Jobs – But That's Good.

The next time you're standing at a busy junction, look around and count how many people you can see driving for a living.

2017-01-23

Are You Ready For State-Sponsored Cyber Attack?

Geopolitical tensions ensure that 2017 will be another big year for large scale and potentially lethal state-sponsored cyber attacks.

2017-01-17

Internet Has Changed The Media Business Model

Advertising media is a broken business model.

2017-01-24

2017: Cybersecurity At A Turning Point

Cybersecurity threats are becoming more intelligent, autonomous and difficult to detect, creating an urgent need for accountability.

2017-01-18

‘Magic’ Ransomware Is Based On Open-Source Code

Abracadabra: A new ransomware based on open-source code that encrypts user files and ads ‘.magic’ extension to them.

2017-01-18

Drone Warriors Of The US Air Force

Leaving Las Vegas & Commuting To The Warzone: US Air Force drone piots lead a strange double life.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyren

Cyren

Cyren is a cloud-based, Internet security technology company providing threat detection and security analytics.

Cavirin

Cavirin

Cavirin’s Automated Risk Analysis Platform reduces risk and automates security and compliance.

Mission Secure (MSi)

Mission Secure (MSi)

MSi is a specialized provider of next generation cyber defense solutions protecting control systems and critical physical assets in energy, transportation and defense.

VNT Software

VNT Software

VNT's vision is to change the way complex IT problems are resolved by predicting business disruptions before they occur.

NGS (UK)

NGS (UK)

NGS (UK) Ltd are independent, vendor agnostic, next generation security trusted advisors, providing all-encompassing solutions from the perimeter to the endpoint.

Quadible

Quadible

Quadible BehavAuth is an AI-platform that continuously authenticates the users, without the need of any input, by learning their behavioural patterns.

Workz Group

Workz Group

Workz connects and protects mobile subscribers of today and tomorrow by providing secure removable or embedded SIMs and remote provisioning solutions for consumer, M2M and IOT devices.

Absolute IT Asset Disposals

Absolute IT Asset Disposals

Absolute IT Asset Disposals is an IT asset disposal (ITAD) company providing safe and secure recycling of IT assets.

Help AG

Help AG

Help AG provides leading enterprise businesses and governments across the Middle East with strategic consultancy combined with tailored information security solutions and services.

Zephyr Project

Zephyr Project

The Zephyr Project strives to deliver the best-in-class RTOS for connected resource-constrained devices, built to be secure and safe.

TopSOC Information Security

TopSOC Information Security

TopSOC Information Security provide a wide range of security consultation, implementation and training services.

gener8tor

gener8tor

The gener8tor Cybersecurity Accelerator offers a cutting-edge program in San Antonio, home to the second-largest concentration of cybersecurity experts in the United States.

RankedRight

RankedRight

RankedRight empowers security teams to take immediate action on their most critical risks.

ID R&D

ID R&D

ID R&D is an award-winning provider of AI-based facial liveness, document liveness, and voice biometrics.

TriCIS

TriCIS

TriCIS design and engineer highly secure integrated solutions that meet the highest government and military security standards, providing information assurance to organisations across the globe.

Cyber Proud

Cyber Proud

Cyber proud is leading a talent revolution to promote and create an inclusive skilled cyber workforce.