News

2018-02-21

Chinese Police Wearing Face Recognition Glasses

Chinese police are now wearing sunglasses equipped with facial-recognition technology connected to a database of criminal suspects.

2018-02-20

Crypto-Mining Is A Growing Epidemic

Cryptocurrency mining presents a real threat to businesses, with nearly 25% of organisations worldwide affected by Coinhive malware.

2018-02-20

A Search Tool That Allows Anyone To Access Cloud Documents

Buckhacker is a hacking tool that trawls unsecured cloud server platforms. Companies using them are at risk of losing control of their data.

2018-02-20

Discover Your Inner Spy

Spyscape: New York has a new museum, designed by a British intelligence officer, giving visitors a taste of life as a secret agent.

2018-02-19

What Do CISOs Prioritise To Improve Cybersecurity?

As security has increasingly become a concern for financial institutions, the role of the CISO has been thrust into the organisational spotlight.

2018-02-19

What Does The US Air Force Want From AI?

Amongst other things, the answer is the capability to shoot someone in the face from 200 Kilometers away.

2018-02-19

Facebook Personal Data Use & Privacy Settings Ruled Illegal

German court rules that Facebook collects and uses personal data without providing enough information to users for them to give meaningful consent.

2018-02-19

Bitcoin Energy Use In Iceland Soars

Making Money: Electricity use at Bitcoin mining data centres located in Iceland is likely to exceed the energy consumption of all the nation's homes.

2018-02-19

UK Blames Russia For NotPetya Cyberattack

UK Defence Minister accuses the Russian government of “undermining democracy” with a cyberattack targeting Ukraine and spread across Europe.

2018-02-16

Facebook Enables 'Fake News'

Digital Deceit: More people are coming to the conclusion that social networking is an overall negative for society.

2018-02-16

Chinese Healthcare Technology Moves Ahead

The big tech firms like Alibaba and Tencent have made delivering better healthcare a priority and are more ambitious than their international peers.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ECSC Group

ECSC Group

ECSC is a full-service information security provider, specialising in 24/7/365 security breach detection and Artificial Intelligence (AI).

Clavister

Clavister

Clavister is a network security vendor delivering a full range of network security solutions for both physical and virtualized environments.

OneWelcome

OneWelcome

Onegini and iWelcome have merged to become OneWelcome, the largest European Identity Access Management Saas Vendor.

PKWARE

PKWARE

PKWARE is a global leader in business data security, providing encryption and compression solutions to enterprise customers and government entities around the world.

CSIRT GOV - Poland

CSIRT GOV - Poland

Computer Security Incident Response Team CSIRT GOV, run by the Head of the Internal Security Agency, acts as the national CSIRT responsible for coordinating the response to computer incidents.

Risk Based Security (RBS)

Risk Based Security (RBS)

Risk Based Security provide the most comprehensive and timely vulnerability intelligence, breach data and risk ratings.

Verificient Technologies

Verificient Technologies

Verificient Technologies specializes in biometrics, computer vision, and machine learning to deliver world-class solutions in continuous identity verification and remote monitoring.

Cyber Range Malaysia

Cyber Range Malaysia

With Cyber Range Malaysia organizations can train their security professionals in empirically valid cyber war-gaming scenarios necessary to develop IT staff skills and instincts for defensive action.

Tego Cyber

Tego Cyber

Tego Cyber delivers a state-of-the-art threat intelligence platform that helps enterprises deploy the proper resolution to an identified threat before the enterprise is compromised.

Pires Investments

Pires Investments

Pires is building an investment portfolio of high-tech businesses across areas such as Artificial Intelligence, Internet of Things, Cyber Security and Augmented/Virtual Reality.

Appsec Phoenix

Appsec Phoenix

Appsec Phoenix is an end to end vulnerability management platform that focuses on workflows, threat feed, and real time data.

Binarly

Binarly

Binarly has developed an AI-powered platform to protect devices against emerging firmware threats.

Cyberplc

Cyberplc

Cyberplc is a global cybersecurity consulting firm providing services to government, the public sector and enterprises.

Bluewave

Bluewave

Bluewave are a strategic IT advisory company that offers businesses a simple and comprehensive way to purchase information technology solutions.

Ingenics Digital

Ingenics Digital

Ingenics Digital is a recognized initiator and leading service provider in the areas of software development and embedded systems.

InfoSight

InfoSight

InfoSight offers proven Cyber Security, Regulatory Compliance, Risk Management and Infrastructure Solutions to protect your business and your customers from cyber crime and fraud.