News

2018-06-19

Business AI Platform For Commercial Development

Some say that tackling business uncertainty can be greatly assisted by artificial intelligence, but it is a many-layered and complex process.

2018-06-18

How Computer Data Helped Investigate Quebec Shooter

The criminal proceedings against Quebec's mosque shooter provided insight on police use of computers to extract information about a suspect.

2018-06-19

Cryptocurrency Malware Theft Is Worth Millions

The market for malware and tools designed specifically for the theft of cryptocurrency is booming with $1.1 billion stolen this year.

2018-06-18

Profile Of An Ethical Bug Hunter

Ethical hacking has moved on from academic researchers and lone wolf hackers and has become a big business, in the form of bug hunting.

2018-06-18

Israeli Cybersecurity Company Beats All Hackers

In a special challenge to hackers Cyber 2.0 offered a cash prize for any hacker able to penetrate the company's online defences.

2018-06-18

Facebook’s Head Of Policy Quits Amid Data Misuse Controversey

Facebook's Elliot Schrage is stepping down after a decade at the company, a rare departure among the senior ranks at the social network.

2018-06-18

Expect A Cyber Attack On The FIFA World Cup In Russia

The Wold Cup could suffer attack vectors from fake ticket spam and infiltration of governing body infrastructure with destructive payloads.

2018-06-15

EC-Council Sets New Application Security Training Standards

The information security certification body, EC-Council, is set to redefine application security by introducing an all new certification program.

2018-06-18

Are US Federal Cyber Workers Good Enough?

US government agencies have made mixed progress at ensuring their cybersecurity workers are properly trained and credentialed.

2018-06-18

World First Police 3D Security Scanner

SWORD: A smartphone app with facial recognition that can a detect a carried weapon or explosives without the need for a physical search.

2018-06-15

NCSC Investigate Giant Dixons Data Breach

The NCSC is working alongside the retailer to detect the hackers who took 5.9 million payment card details and 1.2 million personal data records.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ECSC Group

ECSC Group

ECSC is a full-service information security provider, specialising in 24/7/365 security breach detection and Artificial Intelligence (AI).

VMworld

VMworld

VMworld is a global conference for virtualization and cloud computing, including associated security issues.

Wall Street Technology Association (WSTA)

Wall Street Technology Association (WSTA)

The Wall Street Technology Association (WSTA) provides financial industry technology professionals with forums to learn from and connect with each other.

Nutanix

Nutanix

The Nutanix enterprise cloud platform provides performance, robust security, and seamless application mobility for a broad range of enterprise applications.

Deep Identity

Deep Identity

Deep Identity is a boutique system integrator, with expertise in tailored identity governance & administration (IGA) and identity access management (IAM) solutions.

Duo Security

Duo Security

Duo combines security expertise with a user-centered philosophy to provide two-factor authentication, endpoint remediation and secure single sign-on tools.

CERT NZ

CERT NZ

CERT NZ supports businesses, organisations and individuals affected by cyber security incidents, and provide trusted and authoritative information and advice.

Certis

Certis

Certis is a leading advanced integrated security organisation that develops and delivers multi-disciplinary security and integrated services.

Curtail

Curtail

Curtail keeps businesses running by using live traffic analysis to identify defects before software goes live, and detect and isolate security threats before they impact systems.

oneclick

oneclick

oneclick is a central access and distribution platform in the cloud, enabling the management of the entire technology stack for application provisioning.

YorCyberSec

YorCyberSec

YorCyberSec act as a trusted Cyber and Information Security broker and procurement specialist. We help companies to Reduce Risk, Increase Assurance and Improve Performance.

Thistle Technologies

Thistle Technologies

Thistle Technologies is building tools that help connected device manufacturers build security resiliency into devices.

N-able

N-able

N-Able deliver simple and sophisticated monitoring, security, and business solutions that empower you to solve your toughest IT challenges.

Sectyne

Sectyne

Sectyne is a full-stack cyber consultancy committed to providing tailored services, advisory consultations, and training.

GetHacked.ca

GetHacked.ca

GetHackded.ca is a certified company offering penetration testing and specialized cybersecurity services.

Harmonic Security

Harmonic Security

Harmonic Security helps companies to adopt Generative AI without risking the security and privacy of their data.