News

2016-12-21

NSA Eavesdrops On In-flight Mobile Calls

Thieving Magpie: The NSA and GCHQ have a joint surveillance program dedicated to intercepting targets in-flight by tracking their mobiles.

2016-12-21

Making Sense Of Cyber Insurance

The Dark Web. A sequence of huge Data Breaches. Ransomware. Virtual Currency. How do insurers & their customers make sense of Cybersecurity?

2016-12-20

Tackling Cybercrime: Time For The Regional Gulf Cooperation Council To Join Global Efforts

Gulf countries need to share information, intelligence & lessons learned in order to find the best ways to curb cybercrime. Opinion by Joyce Hakmeh

2016-12-20

Amazon Makes First Successful UK Drone Delivery

Autonomous aerial delivery could be a viable business sooner than thought. For customers with huge gardens, living close to the depot.

2016-12-20

Insurers Are Handling 'hundreds' Of Breach Claims

Business Is Booming: Leading London insurance firm says claims for data breaches are being made at a rate of more than one a day.

2016-12-20

Destructive Cyber Attack On Saudi Kingdom

'State sponsored hackers' have been disrupting air travel and other critical infrastructure in Saudi Arabia. Who is to blame?

2016-12-20

Yahoo Hack Affects 1 Billion Accounts

Yahoo says data from more than one billion accounts may have been hacked. No, not the last big one. There was another one before that....

2016-12-19

Obama Orders ‘Deep Dive’ Into Election Hacking

The White House has requested the Office of the Director of National Intelligence to make a full review of intereference in the US elections.

2016-12-19

Putin Personally Interfered With The US Election

US intelligence believes that Vladimir Putin was personally involved in election hacking in a vendetta against Hillary Clinton.

2016-12-16

MI6 Spies Infiltrate ISIS HQ

British spies are risking their lives daily in Islamic State heartlands to “take the fight to the enemy,” say MI6.

2016-12-13

Japan Aims For No.1 Supercomputer In 2017

Japanese, Chinese and French scientists are competing hard for the title of running the biggest, fastest and most efficient supercomputer.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DMH Stallard

DMH Stallard

DMH Stallard is a mid-market law firm. Areas of expertise include cyber security and cyber crime.

AVR International

AVR International

AVR educate, advise, analyse and provide professional, technical consultancy and support to ensure your business is safe, compliant and protected.

Deep Identity

Deep Identity

Deep Identity is a boutique system integrator, with expertise in tailored identity governance & administration (IGA) and identity access management (IAM) solutions.

Happiest Minds Technologies

Happiest Minds Technologies

Happiest Minds offers domain centric solutions in IT Services, Product Engineering, Infrastructure Management and Security.

CYBER 1

CYBER 1

CYBER 1 provides cyber security solutions to customers wanting to be resilient against new and existing threats.

LRQA Nettitude

LRQA Nettitude

LRQA Nettitude is an award-winning global provider of cybersecurity services, bringing innovative thought leadership to the ever-evolving cybersecurity marketplace.

Cipher Tooth

Cipher Tooth

CipherTooth is a superior system for delivering secure content over the Internet.

Assured Enterprises

Assured Enterprises

Assured Enterprises provides comprehensive cyber risk identification, management and mitigation across all platforms.

MBL Technologies

MBL Technologies

MBL Technologies specializes in information assurance, enterprise security, privacy, and program/project management.

Dermalog Identification Systems

Dermalog Identification Systems

Dermalog Identification Systems is a pioneer in biometry and the largest German manufacturer of biometric devices and systems.

IBA Security

IBA Security

IBA Security is a center of competence consolidating the cybersecurity expertise of the IBA Group.

Corsha

Corsha

Corsha is on a mission to simplify API security and allow enterprises to embrace modernization, complex deployments, and hybrid environments with confidence.

CYBRScore

CYBRScore

CYBRScore is a premium, performance-based cyber skills training and assessment provider that quantifies a user’s ability to defend a network.

Two Six Technologies

Two Six Technologies

Two Six Technologies delivers R&D, innovation, productization and implementation expertise in cyber, data science, mobile, microelectronics and information operations.

CyberCure

CyberCure

CyberCure provide specialised roles and services to manage your organisations cybersecurity requirements and professional advisory services in governance, risk and compliance.

Cloudaeris

Cloudaeris

Cloudaeris is a trusted Microsoft Partner, and we've got what it takes to make your business more efficient and agile.