News

2015-06-29

Seasoned Cybersecurity Professionals : 3 - 5 months Contracts in the US

Must have a Security Clearance or be capable of obtaining one. The work sites are Boston, Denver, Kansas City, Philadelphia, & Wash DC.

2015-06-29

Google Enters Fray For Tesco Loyalty Unit

Tesco’s customer loyalty arm is for sale and Google are interested in buying. For $2 billion.

2015-06-29

How to Hire and Retain the Best IT Talent

How can a company without unlimited resources appeal to and maintain the workforce they need?

2015-06-29

Cambridge to Open Cyber Security Research Centre

The Cambridge Cloud Cybercrime Centre will focus on enhancing our understanding of cyber crime, security tools & techniques.

2015-06-29

NSA Has Reverse-Engineered Consumer Anti-Virus Software To Track Users

The NSA and GCHQ have put extensive effort into hacking popular security software products to “track users and infiltrate networks.”

2015-06-29

GCHQ's Surveillance of Rights Groups is Illegal

Although the interception was lawful, GCHQ retained emails for longer than it should have & violated its own internal procedures.

2015-06-29

The Dangers Of Internet-of-Things In Healthcare

Medical device connectivity to consumer technology raises alarming questions about privacy violation & intentional disruption.

2015-06-29

The Double-Edged Sword of Cyber Warfare

The Israeli army has recognized cyber weapons as a fourth dimension of warfare, alongside land, air and sea.

2015-06-29

FBI Alert: CryptoWall Ransomware Damage $18 Million

The most used vector are phishing emails that have a zipped attachment that claims to be a resume.

2015-06-29

Naresh Singh : Freelance Ethical Hacker

CEH7 Certified Ethical Hacker/Penetration Tester Seeking Freelance Assignments

2015-06-29

Next World War - First, Cyberwar. Second, Shooting War

The more technologically powerful a nation is, the more technologically dependent that nation becomes. Cyberwar can level the playing field.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Schneider Electric

Schneider Electric

Schneider Electric develops connected technologies and solutions to manage energy and process in ways that are safe, reliable and sustainable.

Japan Network Security Association (JNSA)

Japan Network Security Association (JNSA)

JNSA's goal is to promote standardization related to network security and to contribute to greater technological standards in the field.

PerimeterX

PerimeterX

PerimeterX is the leading provider of solutions that secure digital businesses against automated fraud and client-side attacks.

Versa Networks

Versa Networks

Versa is a software-defined networking vendor providing an end-to-end solution that both simplifies and secures the WAN/branch office network.

CodeSealer

CodeSealer

CodeSealer provide invisible end-to-end user interface protection with a unique web security solution to eliminate Man-in-the-Middle and Man-in-the-Browser vulnerabilties.

Seculert

Seculert

The Seculert Attack Detection & Analytics Platform combines machine-learning based analytics and threat intelligence to automatically detect cyber attacks inside the network.

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity make Cars & Infrastructures Cybersecure.

CyCognito

CyCognito

CyCognito empowers companies to take full control over their attack surface by uncovering and eliminating the critical security risks they didn't even know existed.

InfoSec Conferences

InfoSec Conferences

InfoSec Conferences is an online directory of infosec conferences. We list every single Information Security conference, event and seminar within every niche in Cybersecurity.

Police CyberAlarm

Police CyberAlarm

Police CyberAlarm is a free tool to help members understand and monitor malicious cyber activity. This service is made up of two parts; monitoring and vulnerability scanning.

Darkbeam

Darkbeam

Darkbeam provides a unified solution to protect against security, brand and compliance risks across your digital infrastructure.

Axiado

Axiado

Axiado Corporation is a security processor company redefining hardware root of trust with hardware-based security technologies, including per-system AI.

Mode Solutions

Mode Solutions

Mode guarantee IT performance where you need it most, creating seamless and secure solutions that will alleviate pressure from your business.

Cyber-Security Council Germany

Cyber-Security Council Germany

The German Cyber Security Council's objective is to consult businesses, government agencies and political decision-makers and to support them against cybercrime.

Solcon Capital

Solcon Capital

Solcon Capital is a forward-looking, technology-focused investment firm that is committed to identifying and investing in the most promising areas of innovation and development in the tech industry.

APCERT

APCERT

APCERT cooperates with CERTs and CSIRTs to ensure internet security in the Asia Pacific region, based around genuine information sharing, trust and cooperation.