News

2016-09-01

Anatomy Of Cyber Jihad

Islamic State already has the motive, means, and opportunity to acquire the personnel & code necessary to launch devastating cyber attacks.

2016-09-01

Europol Warn Of The Ransomware Threat

Europol has joined forces with cyber security companies to launch a worldwide initiative to tackle Ransomware used by cyber criminals.

2016-08-31

Russian State Agencies Infected With Spyware

While US security experts suspect Russian interference with the presidential campaign, the Russian Government is under attack.

2016-08-31

Humans And The Robotic Future

Imagine a world where where nearly every online interaction takes place with a Siri, Alexa, Cortana or some soon-to-be-named artificial being.

2016-08-31

Edward Snowden Proposes Smartphone Privacy

Russia-based privacy advocate Edward Snowden has proposed a device that will inform users when their phones are disclosing their location.

2016-08-31

Psychological Warfare On Social Media

Twittersphere: Cyberwar between India and Kashmiri insurgents is hotting up with a big PsyOps element, focused on social media.

2016-08-30

Enabling Computer Super Intelligence

ARM is designing a semiconductor chip on which the number of transistors is projected to exceed the number of cells in a human brain.

2016-08-30

US Police Use Pokémon Go To Lure Criminals

There can’t be any doubts now of Pokémon Go’s world domination – even the police are getting in on the action.

2016-08-30

Businesses Need To Protect Data, Not Just Devices

Companies are moving away from platform-specific endpoint security technologies toward securing their applications & data everywhere.

2016-08-30

Over 50% Data Breaches Are Due To Human Error

Cyber-fraud is malicious while a breach caused by user ignorance is not.Their organisational consequence can be equally severe.

2016-08-29

London Police Chief Says Spy Agencies Face Terror Fight

London’s Police Chief says international security agencies can not prevent the type of terrorist attacks that have occurred in France & Germany.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Lacuna Talent

Lacuna Talent

Lacuna Talent delivers the combined power of Via Resource, the international Cyber Security recruiter, and Lacuna Talent, the Specialist AI/Data recruiter.

CERT Polska

CERT Polska

CERT Polska is the first Polish computer emergency response team and operates within the structures of NASK (Research and Academic Computer Network) research institute.

SafeBreach

SafeBreach

SafeBreach's platform simulates hacker breach methods across the entire kill chain to identify breach scenarios in your environment before an attacker does.

SQNetworks

SQNetworks

SQNetworks provides a full range of cybersecurity consultancy, services and solutions.

IOTA Foundation

IOTA Foundation

The IOTA Foundation is a non-profit R&D organisation focused on developing the next generation of protocols for the connected world.

NSHC

NSHC

NSHC is a provider of mobile security solutions, cyber security consulting and training, and offensive research.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Upfort

Upfort

Upfort (formerly Paladin Cyber) unifies award-winning security and robust cyber insurance to deliver comprehensive cyber risk solutions.

Scythe

Scythe

SCYTHE is a next generation red team platform for continuous and realistic enterprise risk assessments.

Australian Cyber Collaboration Centre (Aus3C)

Australian Cyber Collaboration Centre (Aus3C)

The Australian Cyber Collaboration Centre (Aus3C) is committed to building cyber capacity and securing Australia's digital landscape.

Palmchip

Palmchip

Palmchip is a Cyber Security, SOC and Software consulting company. We design and develop high performance and secure applications.

Cornami

Cornami

Cornami delivers real-time computing on encrypted data sets, which is vital for data privacy and cloud security.

Ping Identity

Ping Identity

At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. That’s digital freedom.

Archer Technologies

Archer Technologies

Archer helps organizations manage risk in the digital era—uniting stakeholders, integrating technologies and transforming risk into reward.

Eleviant Tech (CTG Group)

Eleviant Tech (CTG Group)

Eleviant Tech (CTG Group) is a USA based digital transformation company with expertise in Mobile, Cloud, Web, IoT, AR, RPA, Cyberseurity and AI Technologies.

NetAlly

NetAlly

NetAlly network test solutions help engineers and technicians better deploy, manage, maintain, and secure today’s complex wired and wireless networks.