News

2016-05-26

US Must Prepare For Cyber Warfare In Space

The developing stage for warfare is in cyberspace, but the next stage could well grow in a familiar frontier, space.

2016-06-04

Open Access To The Snowden Archive

Emulating the Panama Papers Archive, The Intercept Magazine are opening up access to the secret documents Edward Snowden took from the NSA.

2016-05-26

Both US Presidential Campaigns Hacked

Hackers working for foreign governments are targeting the main candidates in this year's presidential election.

2016-05-26

March Of The Machines

The world stands on the brink of a 4th industrial revolution, not just about manufacturing or automation but transforming services & professions.

2016-05-25

Cyberwar: The Smart Person's Guide

Cyberwarfare is real. Governments are spending £billions making sure they can fight battles on the internet & you might get caught in the crossfire.

2016-05-24

Google Hiring People To Test Self-Driving Cars

Help Wanted: Strong nerves and the ability to give concise engineering feedback required.

2016-05-19

China Denounces Pentagon Cyberwarfare Report

China does not like a new new US Defense Department report that puts a spotlight on cyberwarfare.

2016-05-18

Britain’s Border Control Systems Keep Falling Over

The system that provides a critical additional layer of security by screening all passengers against lists of suspected individuals is not reliable.

2016-05-19

Anonymous Declares War On Global Banks

Operation Icarus: The hacking collective Anonymous has launched a thirty-day campaign against global banks..

2016-05-18

Russian Hackers Try To Attack German Governing Party.

Pawn Storm hackers appear to be trying to steal personal and corporate data from the governing CDU party and other high-profile individuals.

2016-05-16

Think You Know Your Customers? Try Authenticating Them

Customer demands are increasing and changing rapidly, forcing companies to adopt new technologies that scale with their business security needs.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Copper Horse Solutions

Copper Horse Solutions

Copper Horse specialises in mobile and IoT security, engineering solutions throughout the product lifecycle from requirements to product security investigations.

Egerie

Egerie

EGERIE's RiskManager solution provides a Global, Centralized, and Updated view of risk maps and security measures for your company.

UZCERT

UZCERT

UZCERT is the national Computer Emergency Response Team for Uzbekistan.

Comarch

Comarch

Comarch is a provider of IT business solutions to optimize operational and business processes. Cyber security solutions are focused on Identity Management and Security Assessment services.

Araxxe

Araxxe

Araxxe delivers Revenue Assurance, End-to-End Billing Verification and Interconnect Fraud Detection solutions to communication companies worldwide.

Bl4ckswan

Bl4ckswan

Bl4ckswan is a Management Consulting firm specialized in the delivery of information security and compliance services.

CYRail

CYRail

CYRail project will analyse threats targeting Railway infrastructures and develop innovative attack detection and alerting techniques.

Concordium

Concordium

Concordium aims to build the world’s leading open-source, permissionless, and decentralized blockchain with built-in user identity at the protocol level.

Ukrainian Academy of Cyber Security (UACS)

Ukrainian Academy of Cyber Security (UACS)

UACS is a professional non-profit public organization established to promote the development of an extensive network and ecosystem of education and training in the field of cyber security.

oneclick

oneclick

oneclick is a central access and distribution platform in the cloud, enabling the management of the entire technology stack for application provisioning.

Polymer

Polymer

Polymer is a Data Governance & Privacy Platform for third party SaaS apps. A modern Data Loss Protection (DLP) approach to remove sensitive data exposure on collaboration tools in real-time.

Netizen

Netizen

Netizen is an award-winning company that develops and leverages innovative solutions to enable a more secure cyberspace for clients in government and commercial markets.

dWallet Labs

dWallet Labs

dWallet Labs is a cybersecurity company specializing in blockchain technology. We believe that the future of Web3 relies on cutting edge cryptography and unabated security.

Accelerynt

Accelerynt

Accelerynt was founded with a singular purpose: help teams like yours build cybersecurity resilience.

WillJam Ventures

WillJam Ventures

WillJam Ventures are a private equity firm focused on investing in world-class cybersecurity companies that will become the next generation of leaders in protecting the world’s digital assets.

Sacumen

Sacumen

Sacumen is a niche player in the cybersecurity market, solving critical problems for security product companies.