News

2019-03-04

The US Military Has A Free Rein For Offensive Hacking

The Trump administration made it easier for the US military to conduct offensive cyber operations. But this new authority should be used carefully.

2019-03-04

Facebook Has Changed Computing

Many of the apps and services we use every day are built with technologies that Facebook developed and then shared with the world.

2019-03-04

Trump Wants US Government To Prioritise AI

President Trumps instructs US Federal Agencies to focus on AI to help promote US industrial development.

2019-02-20

Apple ‘Subscription Confirmation’ Phishing Scam

Apple users should be alert to a new phishing scam designed to trick them into handing over personal financial information to online criminals.

2019-02-22

New Zealand Business Has Increased Cybersecurity Spending, Not Expertise

The NZ security authorities are worried that whilst business is spending more on cybersecurity tools there is not enough investment in skills & training.

2019-02-28

Could An AI Arms Race Lead To Accidental War?

Chinese experts worry that a rush to integrate AI into weapons and other military equipment could accidentally lead to war between nations.

2019-02-27

Facebook Is Moving Fast To Get Into Blockchain

Facebook is building its war chest for blockchain, from open hiring to bringing in top talent by acquiring start-up company Chainspace.

2019-02-28

AI Driven Cybersecurity Gives Companies A Fighting-Chance

It’s becoming clear that using artificial intelligence and machine learning is the safest way to lock down data and protect the enterprise.

2019-02-26

Personal Cyber Insurance Market Could Be Worth $3B by 2025

Big insurance companies are creating personal cyber insurance products specifically designed to cover loss or liability in the event of a cyber-attack.

2019-02-27

Three Ways the Pentagon Could Improve Cyber Intelligence

The US military needs to expand its cyber intelligence capabilities to meet the Trump administration’s new cybersecurity strategy.

2019-02-26

DARPA To Test Infrastructure Resilience

Cyber-attacks pose a challenge for US infrastructure security and DARPA have set up a joint exercise to test resistance to multiple threats.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Exclusive Networks

Exclusive Networks

Exclusive Networks accelerate market entry and growth for innovative cybersecurity, networking and infrastructure technologies.

Center for a New American Security (CNAS)

Center for a New American Security (CNAS)

CNAS is the nation's leading research institution focused on defense and national security policy. Cyber security issues are an intrinsic element of the national security debate.

Globalscape

Globalscape

Globalscape is a leader in secure data exchange solutions.

Cleafy

Cleafy

Cleafy are a team of fraud hunters, cybersecurity experts, data scientists, and software engineers. Our purpose is to make people’s life easier and free from the threats in the digital ecosystem.

Celestya

Celestya

Celestya is dedicated to providing the most advanced and cost effective systems for human behavior education on cybersecurity awareness training.

Wotan Monitoring

Wotan Monitoring

Wotan Monitoring is the software solution for fully automatic process monitoring, infrastructure monitoring and end-to-end monitoring.

Zecurion

Zecurion

Zecurion data loss prevention (DLP) solution is an easy-to-use solution for securing confidential data at rest and in motion.

Cyber Security Malta

Cyber Security Malta

Cyber Security Malta is part of Malta's National Cyber Security Strategy which aims to combat cybercrime, strengthen national cyber defence and provide cyber security awareness and education.

Very Good Security (VGS)

Very Good Security (VGS)

VGS is the modern approach to data security. Our SaaS solution gives you all the benefits of interacting with sensitive and regulated data without the liability of securing it.

Accelerator Frankfurt

Accelerator Frankfurt

Accelerator Frankfurt is an independent go-to-market program focused on Fintech, Cybersecurity and Digital B2B startups.

Greenberg Traurig (GT)

Greenberg Traurig (GT)

Greenberg Traurig, LLP (GT) is a global law firm with offices in 40 locations in the United States, Latin America, Europe, Asia, and the Middle East.

Alpha Omega Integration

Alpha Omega Integration

Alpha Omega creates new possibilities through intelligent end-to-end mission-focused government IT solutions.

Silent Circle

Silent Circle

Silent Circle is the leader in end-to-end enterprise solutions for secure mobile communications.

Applied Connective Technologies

Applied Connective Technologies

Applied Connective is one team for all your technology needs, from IT to phones, cyber security to physical security, audio/video and the infrastructure to support it.

5S Technologies

5S Technologies

5S Technologies is a regional IT solutions and services provider based in Cary, NC and serving the Carolinas.

Center for Cyber Security Studies & Research (CFCS2R)

Center for Cyber Security Studies & Research (CFCS2R)

CFCS2R's mission is to empower individuals, organizations, and governments with the knowledge and tools necessary to protect against cyber threats.