News

2018-02-09

Killer Robots Will Be Ubiquitous In The US Army

In future, every US combat vehicle is going to have the capability to be robotic and to deliver 'solid lethality'.

2018-02-07

High Tech Police Tool Up For Winter Olympics

S. Korea is planning to deploy 10,000 police officers in and around Pyeongchang to protect the events against cyber attacks & other disruption.

2018-02-06

Alphabet Launches A Cybersecurity Company - Chronicle

Alphabet, the parent company of Google, Nest, Waymo, and many other companies, is launching a cybersecurity startup.

2018-02-07

Drones: A Crowd-Management Solution

India is working on crowd-management solutions in public places using drones for both crowd management and infrastructure inspection.

2018-01-30

In S.Africa The Cybersecurity Skills Gap Is A Chasm

South Africa has seen a steady rise in cyber-crime, jumping to rank as the 3rd most cyber attacked country in the world. The situation is dire.

2018-01-30

Cyber Attacks Rank Alongside Natural Disasters

A big cyber attack could cost as much as a major hurricane and like extreme weather and other natural disasters, cyber attacks are a global issue.

2018-01-31

You Probably Don’t Know All the Ways Facebook Tracks You

When you sign up with Facebook you become their product. You might not realise just how deep or extensive their tracking of your behaviour goes.

2018-01-31

Facebook Names IBM Watson Executive AI Chief

Facebook brings in an experienced ex-IBM manager to navigate the company’s broadening ambitions for how AI can shape its products.

2018-02-02

AI Will Create More Jobs Than It Eliminates

The impact on jobs from AI will take a positive turn by 2020, and will reach two million net new jobs in 2025, according to Gartner.

2018-02-01

The Role Of Blockchain In Helping Organisations Meet GDPR Compliance

Blockchain and the GDPR are two of the data management industry’s hottest buzzwords and they have more than just buzz in common.

2018-02-05

Iran Adopts Russian Style CyberWar Tactics

The Iranian regime has deployed cyber trolls and online bots to push back against online dissent and influence social media trends.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Patchstack

Patchstack

Patchstack (formerly WebARX) is a web application security platform, which allows digital agencies and developers to monitor, protect and maintain their websites.

Granite Partners

Granite Partners

Granite is a cloud service for the development of business risk management, cyber security and privacy and occupational safety and health.

Swedish Civil Contingencies Agency (MSB)

Swedish Civil Contingencies Agency (MSB)

MSB's Information Assurance Department is responsible for supporting and coordinating work relating to Sweden's national societal information security.

IoT Security Institute (IoTSI)

IoT Security Institute (IoTSI)

IoT Security Institute is an academic and industry body dedicated to providing frameworks and supporting educational services to assist in managing security within an Internet of Things eco-system.

SOSA

SOSA

SOSA facilitates new growth opportunities by connecting the dots between industry verticals and innovation ecosystems around the world.

Stealth Software Technologies

Stealth Software Technologies

Stealth Software Technologies is focused on the generation of research and software products focused on applied cryptography and cybersecurity.

ThreatX

ThreatX

ThreatX provides complete web application & API protection to address expanding app footprints and complex attacks.

Cybermerc

Cybermerc

Cybermerc's services, training programmes and cyber security solutions are designed to forge collaborations across industry, government and academia, for collective defence of our digital borders.

ADGS

ADGS

ADGS is a deeptech company focused in the fields of Agent-Based simulations (Emergent Behavior), Cybersecurity and Biometrics, Social Dynamics, Natural Language Processing and Artificial Intelligence.

KryptoKloud

KryptoKloud

KryptoKloud offer a suite of Managed Services including Security Monitoring and Incident Response as well as a full portfolio of Compliance, Governance and Audit solutions.

ReasonLabs

ReasonLabs

ReasonLabs have created a next-generation anti-virus that is enterprise grade, yet accessible to any personal device around the world.

RiskOptics

RiskOptics

RiskOptics (formerly Reciprocity) equips organizations with one of the most intuitive and powerful information security and cyber risk management solutions in the market.

Communications Fraud Control Association (CFCA)

Communications Fraud Control Association (CFCA)

CFCA is the premier International Association for fraud risk management, fraud prevention and profitability control.

ShieldIO

ShieldIO

ShieldIO Real-Time Homomorphic Encryption™ enables your organization to reach regulatory compliance without compromising data availability.

Ebryx

Ebryx

At Ebryx, we are at the forefront of cybersecurity innovation, leveraging over a decade of expertise to protect and empower organizations worldwide.

Cylerian

Cylerian

Cylerian is a Next Generation SaaS Security Platform - One unified cloud platform to achieve your security, compliance, and operational objectives.