News

2018-08-01

UK Business Is Overconfident About Cybersecurity

75% of executives say their company is better prepared than competitors, up from 60% a year ago and 43% said their firm was a top performer.

2018-07-25

Chinese Hackers Target Cambodian Elections

Chinese spies are targeting Cambodian government institutions, opposition party members & media in advance of national elections.

2018-07-31

Facebook & Fake News

Critics claim that Facebook simply isn’t willing to make the hard choices necessary to tackle fake news.

2018-07-31

Palestinian Authorities Under Cyber Attack

A group named Gaza Cybergang that has previously targeted Palestinian law enforcement is now back in action targeting government officials.

2018-07-31

Artificial Intelligence & Threat Detection

Two elite Canadian institutions are embarked on a cybersecurity research collaboration, focused on automated threat detection mechanisms.

2018-07-30

Safeguarding 'the right to be forgotten'

The 'right to be forgotten' is a fundamental human right and recent legislation like the GDPR is an attempt to establish this right for EU citizens.

2018-07-30

The Cyber Security Intelligence Network

BAE Systems has launched a new industry forum and lobbying group called The Intelligence Network to address increases in cyber-attacks.

2018-07-30

What is Digital Twin Technology?

Digital Twin technology has moved beyond manufacturing and into the merging worlds of the IoT, Artificial Intelligence and Data Analytics.

2018-07-27

Maintaining GDPR Compliance

GDPR compliance efforts by many organisations are not just a work in progress, in many cases the work is just beginning.

2018-07-27

Help The Aged: Indian Cops Give Cybersecurity Tips

Police workshops on the latest ATM fraud techniques and phishing, how to protect users' money and what to do in case they fall victim.

2018-07-27

Why Is Rural Broadband Access A Problem?

Only 55 percent of people living in US rural areas have access to the broadband speeds that are available to 94 percent of the urban population.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Secure Source

Secure Source

Secure Source specialise in search and recruitment for Cyber Security and Security Cleared markets.

MKD-CIRT

MKD-CIRT

MKD-CIRT is the national Computer Incident Response Team for Macedonia.

CyberPoint

CyberPoint

CyberPoint delivers innovative, leading-edge cyber security products, solutions, and services to customers worldwide.

Tevora

Tevora

Tevora is a specialized management consultancy focused on cyber security, risk, and compliance services.

Gorodissky IP Security

Gorodissky IP Security

Gorodissky IP Security is a comprehensive approach to protecting your intellectual property on the Internet and beyond.

GBT Technologies

GBT Technologies

GBT Technologies is a technology company focused on chip design and software to enable IoT, global mesh networks, and for applications relating to artificial intelligence.

Research Institute in Secure Hardware and Embedded Systems (RISE)

Research Institute in Secure Hardware and Embedded Systems (RISE)

The UK Research Institute in Secure Hardware and Embedded Systems (RISE) seeks to identify and address key issues that underpin our understanding of Hardware Security.

DataSixth Security Consulting

DataSixth Security Consulting

DataSixth delivers Cybersecurity Intelligence. With our unique capabilities, we’re able to deliver value, deliver answers, and deliver actionable security intelligence.

Sectyne

Sectyne

Sectyne is a full-stack cyber consultancy committed to providing tailored services, advisory consultations, and training.

Coretelligent

Coretelligent

Coretelligent is a leading providers of Managed and Co-Managed IT, cybersecurity and private cloud services.

RiskOptics

RiskOptics

RiskOptics (formerly Reciprocity) equips organizations with one of the most intuitive and powerful information security and cyber risk management solutions in the market.

Hush

Hush

Hush is a premium privacy service that gives people unprecedented visibility and control of their digital footprint. Hush assesses threats, and goes to work to eliminate digital risks on your behalf.

Anjuna Security

Anjuna Security

Software from Anjuna Security effortlessly enables enterprises to safely run even their most sensitive workloads in the public cloud.

Azerbaijan Cybersecurity Center (ACC)

Azerbaijan Cybersecurity Center (ACC)

Azerbaijan Cybersecurity Center is a state-of-the-art facility to deliver advanced cyber training programs and build the next generation of Azerbaijan’s cybersecurity professionals.

Netsurit

Netsurit

Managed IT, Cloud, and Security Services. Netsurit is Your IT Innovation and Digital Transformation Accelerator.

Token

Token

Token is changing the way our customers secure their organizations by providing passwordless, biometric, multifactor authentication.