News

2016-09-16

Delete Google Maps But They'll Still Track You

Google, it seems, is very, very interested in knowing where you are at all times.

2016-09-15

GCHQ To Create A UK National Firewall

The UK’s surveillance agency GCHQ is planning to create a British firewall offering national protection against malicious hackers.

2016-09-15

Artificial Intelligence & The Future Of Cybersecurity

AI can be used to detect threats, including those that are yet to be discovered, by identifying shared characteristics within families of threats.

2016-09-16

The White House Has Four Keys To Improving Cybersecurity

Never Too Late: The US Government has a plan to to improve cybersecurity across the board.

2016-09-14

Financial Institutions & Cybercrime

Major thefts, including giant frauds against the SWIFT bank network, show the dangers posed by cybercrime to the international financial system.

2016-09-16

New Bitcoin Analytics Tool

Law enforcement agencies have an immediate need to reduce the time and resources necessary to trace illicit commerce using Bitcoin.

2016-09-15

Effective Drone Defence & Control

The proliferation of drones across a range of military applications is focussing attention of defensive measures.

2016-09-14

How Hackers Infiltrate Systems

To defend your organisation against complex and simple attacks alike, think like a hacker.

2016-09-14

Mass Surveillance: Cuba Filters Text Messages

Cuba Libre: Mass surveillance mobile telecoms program based on key search terms like 'democracy' and 'human rights'.

2016-09-14

US Spy Agencies Will Analyse Insider-Threats

Sentimental: US spy agency plans to identify the people inside the organization most likely to abuse their access privileges by analysing text.

2016-09-12

Obama Warns Of Russian Cyber Warfare Threat

There is a risk of a 'Wild West' style escalating struggle between the US and other cyber-equipped powers.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Sapphire

Sapphire

Sapphire deliver flexible and scalable cybersecurity solutions, helping organisations to detect, protect, respond and remediate against cyber threats.

SealPath

SealPath

SealPath enables companies to protect and control their documents wherever they are: In their PC, in their corporate network, on a partner’s network, in the cloud.

JumpCloud

JumpCloud

JumpCloud's Directory-as-a-Service (DaaS) is the single point of authority to authenticate, authorize, and manage the identities of a business’s employees and the systems and IT resources they need.

CLUSIS

CLUSIS

CLUSIS is an association for the information security industry in Switzerland.

ThreatSTOP

ThreatSTOP

ThreatSTOP is a cloud-based automated threat intelligence platform that converts the latest threat data into enforcement policies to stop attacks before they become breaches.

Appvisory

Appvisory

Appvisory by MediaTest Digital is the leading Mobile Application Management-Software in Europe and enables enterprises to work secure on smartphones and tablets.

Norwest Venture Partners (NVP)

Norwest Venture Partners (NVP)

Norwest Venture Partners offer entrepreneurs a broad range of services to help them build their businesses at every stage of growth. Key sectors include AI, Infrastructure, SaaS and Security.

InfoSec Conferences

InfoSec Conferences

InfoSec Conferences is an online directory of infosec conferences. We list every single Information Security conference, event and seminar within every niche in Cybersecurity.

OSIbeyond

OSIbeyond

OSIbeyond provides comprehensive Managed IT Services to organizations in the Washington D.C., MD, and VA area including IT Help Desk Support, Cloud Solutions, Cybersecurity, and Technology Strategy.

MalwareFox

MalwareFox

MalwareFox is an advanced, yet simple-to-use anti-malware solution for Windows computers. We provide aggressive detection capabilities and an effective malware removal tool to keep your systems safe.

R-Tech

R-Tech

R-Tech GmbH manages the digital start-up initiative, whose goal is to build a sustainable start-up culture in the field of digitization throughout the Upper Palatinate district of Bavaria.

Clarabot Nano

Clarabot Nano

Nano is the secure file sharing tool to improve content search, data access and collaboration between multiple parties.

Black Girls In Cyber (BGiC)

Black Girls In Cyber (BGiC)

Black Girls In Cyber's mission is to increase industry awareness and diversity in cybersecurity, privacy, and STEM for women of color.

Lansweeper

Lansweeper

Lansweeper is an IT Asset Management platform provider helping businesses better understand, manage and protect their IT devices and network.

Frontal

Frontal

Frontal is a specialized unit in Blockchain and Web3.0 cybersecurity. Securing Digital Assets, Cryptocurrency, DeFi, Blockchain and Web3.0 ecosystem.

Cyrex

Cyrex

Cyrex is a Web3 security and development company. Our mastery over decentralized applications, smart contracts and blockchain will keep you secure across Web3.