News

2018-07-16

Is Cyber The Perfect Weapon?

Millions of intrusions into other countries’ networks occur each year, but only a half-dozen or so have done actual significant physical harm.

2018-07-16

Russia Will Keep Up Cyber Attacks For Geo-Political Influence

Ukraine's intelligence chiefs are convinced Russia is committed to using de-stabilising cyber attacks as tools to extend its international influence.

2018-07-16

Coast Guard Academy Creates New Cybersystems Program

The U.S. Coast Guard Academy is now offering an academic program in cyber systems, its first major new initiative in a quarter century.

2018-07-13

Breakthrough Technologies To Combat Insider Threats

Advances in technology have a positive outlook on keeping sensitive data safe. Here are five emerging tools for mitigating insider threats.

2018-07-13

Fake News Is A Real Cybesecurity Risk

The viral nature of fake news does more than spread misinformation, it presents extensive cybersecurity risks that are not making the news.

2018-07-13

Are Women Better At Cyber Security?

The cybersecurity industry needs more analytical, curious and creative individuals. These prized qualities could be hidden in plain sight.

2018-07-12

Fake Dating Apps Infiltrate Israeli Military

Hamas has a sophisticated spyware operation designed to trick Israeli Defense Force soldiers into downloading malicious apps.

2018-07-12

Digital Shock. Part 2

The Challenge of Policing Cyber Crime. A Three Part Introduction to Cyber Crime and its Effects on Current UK Policing. (£)

2018-07-11

HSBC Robots Aren't Bankers. Yet

The head of innovation for HSBC thinks a robot powered by machine learning could help the multinational bank transform retail banking.

2018-07-11

China Is Spying On Germany

Chinese agents actively networking with German MPs, offering them money and foreign travel in exchange for expertise and 'insider knowledge'.

2018-07-11

EU Creates A Unified Cyber-Force

EU member states have agreed to create “EU Cyber Rapid Response Force” teams and is enlisting support from all member states.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

PubNub

PubNub

PubNub enables developers to build secure realtime Mobile, Web, and IoT Apps.

Acalvio Technologies

Acalvio Technologies

Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter.

Atlantic Council Digital Forensic Research Lab (DFRLab)

Atlantic Council Digital Forensic Research Lab (DFRLab)

The Atlantic Council’s DFRLab has operationalized the study of disinformation by exposing falsehoods and fake news, documenting human rights abuses, and building digital resilience worldwide.

VKANSEE

VKANSEE

VKANSEE offer the world's thinnest optical fingerprint sensor for mobile device protection.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CipherBlade

CipherBlade

CipherBlade specializes in blockchain forensics, data science and transaction tracking.

Incopro

Incopro

Incopro is an online IP and brand protection software provider that arms brand owners with actionable intelligence to combat online and offline intellectual property and copyright infringements.

Center for Information Technology Policy (CITP) - Princeton University

Center for Information Technology Policy (CITP) - Princeton University

The Center for Information Technology Policy at Princeton University is a nexus of expertise in technology, engineering, public policy, and the social sciences.

Appurity

Appurity

Appurity specialises in mobile and application security, delivering comprehensive solutions across all verticals.

Oman Technology Fund (OTF)

Oman Technology Fund (OTF)

Oman Technology Fund aims to make Oman the preferred destination for emerging tech companies in the region, and an attractive and stimulating destination for venture capital.

Otava

Otava

Otava is a global leader of secure, compliant hybrid cloud and IT solutions for service providers, channel partners and enterprise clients.

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

CSIRO is Australia's national science agency. We solve the greatest challenges through innovative science and technology.

Box

Box

Box is the Cloud Content Management company that empowers enterprises to revolutionize how they work by securely connecting their people, information and applications.

Oduma Solutions

Oduma Solutions

Oduma Solutions is a wholly owned Ghanaian Cybersecurity company that offers information security services to organisations seeking to improve their security posture.

Reach Security

Reach Security

Reach is the first generative AI platform purpose-built to empower enterprise security teams. With Reach, organizations measure, manage, and improve their enterprise security posture at scale.

Security Solutions Services (S-3)

Security Solutions Services (S-3)

S-3 specialize in crafting tailored network design, security hardware, software, and storage solutions for businesses of all sizes.