News

2018-01-22

The CIA Discovers It Has A Mole

The arrest of a former CIA case officer sheds light on a shadowy counterintelligence drama that has been playing out for nearly eight years.

2018-01-22

How To Handle A Cyber Crisis

An unnamed Canadian Bank didn’t know how to publicly manage a cyber crisis and called in the experts. Here is their advice.

2018-01-22

Twitter Reveals True Extent Of Russian US Election Posts

Twitter has admitted that a far greater number of Russia-linked accounts posted material about the 2016 US election than it has previously disclosed.

2018-01-22

Massive Breach: 3m Healthcare Records Compromised

Healthcare records of three million Norwegians compromised in "professional" cyber attack.

2018-01-19

The Big Online Advertising Swindle

Fake news, concerns over privacy and political manipulation are some of the issues swirling around social media. There is also advertising fraud.

2018-01-17

Iran’s Internal Conflict Plays Out On Social Media

Disinformation, Bots, #Hashtag wars. The civil unrest on the streets of Iran is being mirrored on social media, where government and protesters clash.

2018-01-17

Applying Blockchain to Cybersecurity

Blockchain technology's key attribute is that it enables secure information transmission on the network with no human involvement. That's useful.

2018-01-17

AI Powers VW’s New Electric Microbus

VW is working with NVidia to deliver AI features to the next generation of its vehicles, like speech & gesture recognition and driver monitoring.

2018-01-16

What You Need to Know About The General Data Protection Regulation

The GDPR Advisory Board answers questions about workforce training and the ways to become legally compliant before the May 2018 deadline.

2018-01-18

Russian Hackers Trying To Infiltrate US Senate

Russian hackers accused of breaching the US Democratic Party and meddling in the French Presidential election are targeting US Senators.

2018-01-18

Cyber Attacks Will Continue to Succeed

Spectre and Meltdown demonstrate weaknesses in current hardware cybersecurity that will force a paradigm shift within the semiconductor industry.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Perforce Software

Perforce Software

Perforce helps companies build complex software products more collaboratively, securely, and efficiently.

Securosis

Securosis

Securosis is an information security research and advisory firm dedicated to improving the practice of information security.

Foundation for Strategic Research (FRS)

Foundation for Strategic Research (FRS)

The Foundation for Strategic Research is France's main independent think tank on strategic, defense and security issues. Cyber security is covered as part of the study areas.

Optimum Insurance

Optimum Insurance

Optimum's Cyber Risk & Data Protection Insurance policies are designed to protect against cyber exposures that arise when a company’s data and customer information is breached or stolen.

Secure-NOK

Secure-NOK

Secure-NOK provides products and solutions that detect and remove security attacks and harmful events in industrial networks and control systems.

Jeffer Mangels Butler & Mitchell LLP (JMBM)

Jeffer Mangels Butler & Mitchell LLP (JMBM)

JMBM is a full service law firm providing counseling and litigation services in a wide range of areas including cyber security.

GreyCortex

GreyCortex

GreyCortex uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

Identifi Global Recruitment

Identifi Global Recruitment

Identifi Global is one of the UK's leading Cyber Security & IT Recruitment specialists.

Cyber Struggle

Cyber Struggle

At Cyber Struggle, our aim is training and certifying the special forces of the cyber world.

Red Alert Labs

Red Alert Labs

Red Alert Labs is an IoT security provider. We created an independent security lab with a disruptive business offer to solve the technical and commercial challenges in IoT.

Cycode

Cycode

Cycode is the industry’s first source code control, detection, and response platform.

L3Harris Technologies

L3Harris Technologies

L3Harris Technologies is a global aerospace and defense technology innovator, delivering solutions to meet mission-critical needs across air, land, sea, space and cyber domains.

Netizen

Netizen

Netizen is an award-winning company that develops and leverages innovative solutions to enable a more secure cyberspace for clients in government and commercial markets.

Northdoor

Northdoor

Northdoor provides a comprehensive set of services around information security and works with leading global technology vendors to deploy and manage cyber security solutions.

EkoCyber

EkoCyber

EkoCyber partner with businesses as a value-added MSSP to provide top-tier, trusted and transparent cyber security services at an affordable price point.

Aurascape AI

Aurascape AI

Aurascape is working on advanced cybersecurity solutions powered by grounds-up generative AI architecture.