News

2015-06-29

4 News Apps that Will Change Everything

These apps combine the eclectic harvesting of the best content from thousands of news sources with the curating power & skills of human editors.

2015-06-27

5 Facts that Explain Cyber Warfare

The biggest threat to national security these days comes from a computer with a simple Internet connection.

2015-06-27

Drone Operators’ Jobs Are Safe From Robots…For Now

It’s not that machines can’t see & it’s not that they can’t think. They lack imagination & that ability is central to target recognition.

2015-06-27

Hackers target Polish airline carrier LOT

An "IT attack" meant the airline unable to create flight plans and flights were not able to depart from Warsaw.

2015-06-27

NSA Chief: Don’t Assume China Hacked OPM

The cybersecurity group FireEye says it’s “highly confident” that Chinese hackers did it but Admiral Rogers is not so sure.

2015-06-27

Data Security and Loss of Control Killing Cloud?

Opinion By Frank Jennings Cloud & Commercial Lawyer at Wallace LLP

2015-06-25

US spied on French presidents

Espionage Elysee: How the NSA spied on communications of 3 French presidents as well as French ministers & the ambassador to the US.

2015-06-24

A Quick Tour in the Web Black Market

The most important requirement for both buyers and sellers is the anonymity of the transaction using untraced networks & virtual currency.

2015-06-23

WhiteHat Security: Majority of Websites Are Vulnerable to Data Thieves

Public administration websites had the worst record with 64% at risk every day, followed by Retail at 55%.

2015-06-23

Financial Services Firms Stare into the Abyss as Data Breaches Rocket

The UK Information Commissioner’s Office reports 791 breaches in this sector between 2012 and 2014, including 585 in 2014 alone.

2015-06-23

PwC says UK Security Breaches Often Not Reported

The majority of UK organisations suffering a security or data breach will never report it.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

King & Spalding

King & Spalding

King & Spalding is an international law firm with offices in the United States, Europe and the Middle East. Practice areas include Data, Privacy & Security.

Saudi Federation for Cyber Security and Programming (SAFCSP)

Saudi Federation for Cyber Security and Programming (SAFCSP)

SAFCSP is a national institution under the umbrella of the Saudi Arabian Olympic Committee, which seeks to build national and professional capabilities in the fields of cyber security and programming.

NetKnights

NetKnights

NetKnights is an independent IT security company which offers services and products for strong authentication, identity management and encryption.

Wüpper Management Consulting (WMC)

Wüpper Management Consulting (WMC)

Specialized in compliance, risk management and holistic information security WMC GmbH has longtime implementation experience in global projects.

Clym

Clym

Clym is the data privacy platform that helps organisations meet their data protection obligations. Cookies, Consent, Requests, Policies and more are all managed in a secure and adaptive application.

Sternum

Sternum

Sternum provides reliable and effective endpoint security for any IoT device, using robust technology and seamless integration.

Swiss Accreditation Service (SAS)

Swiss Accreditation Service (SAS)

SAS is the national accreditation body for Switzerland. The directory of members provides details of organisations offering certification services for ISO 27001.

Swarmnetics

Swarmnetics

Swarmnetics helps customers discover hard-to-find software vulnerabilities by hacking your system before the bad guys do.

Mindsight

Mindsight

Mindsight is a technology consulting firm with expertise from cybersecurity to cloud, disaster recovery to infrastructure, and collaboration to contact center.

Fusion Risk Management

Fusion Risk Management

Fusion Risk Management focuses on operational resilience encompassing business continuity, risk management, IT risk, and crisis and incident management.

CyberArmor

CyberArmor

Cyber Armor defend everyday IT and OT systems, from government agencies to critical infrastructure, from system integrators to small industries.

Debevoise & Plimpton

Debevoise & Plimpton

Debevoise & Plimpton LLP is a premier law firm with market-leading practices in areas including Data Strategy & Security.

SHI International

SHI International

SHI International deliver against your IT and business needs, helping you build strategies and solutions that will drive innovation, collaboration and security.

Intel Ignite

Intel Ignite

Intel Ignite is an internationally renowned acceleration program for early-stage deep tech startups.

Appranix

Appranix

Appranix delivers Cloud App Resilience with app-centric entire cloud resources backup, restore, and cross-region disaster recovery.

Apexanalytix

Apexanalytix

Apexanalytix is a leading provider of supplier onboarding, risk management and recovery solutions.