News

2017-12-18

Russia Will Build A Separate Internet Directory

The Russian government plans to build an “independent internet” for BRIC nations as an alternative to the global Domain Name System .

2017-12-18

Undersea Telecoms Cables Are Interception Targets

Undersea cables carrying vital data are essential to modern communications but lack both physical and legal protections. That's a problem.

2017-12-15

Cyber Criminals Are The New Mafia

New participants have transformed cybercrime from isolated, individual acts into pervasive, savage practices run by distinct groups.

2017-12-15

MH370 Loss Could Have Been A Remote Skyjacking

It emerges that the missing aircraft was fitted with a post 9/11 'uninterruptible' autopilot system capable of being hacked & remotely controlled.

2017-12-14

German Spies Warn Of Chinese Espionage

The German domestic intelligence agency (BfV) has detected fake LinkedIn profiles from China being used to recruit high level informants.

2017-12-15

ISIS Warns Of Imminent Cyber Attacks On The US

Losing on the ground, ISIS has renewed its threats to 'penetrate' websites including government and military, identifying America as the target.

2018-01-26

The GDPR Advisory Board Offers Expert Advice

The GDPR Advisory Board is an accessible platform for organisations baffled by the implications of the General Data Protection Regulation.

2017-12-14

Botnets Are Here To Stay

Botnets work by infecting connected devices with malware, then managing them using a command and control server. The results can be devastating.

2017-12-14

Bitcoin Exchanges Under Siege

Three out of four Bitcoin exchanges and related cryptocurrency sites have suffered a DDoS attack in the third quarter of 2017.

2017-12-14

British Banks Are Hiding Cyber Attacks

Coverup: The UK Financial regulator suspects "material under-reporting of successful cyber-attacks" on banks and other financial institutions.

2017-12-13

10 Things About The Network and Information Security Directive (NIS)

Ready for GDPR? Here comes the EU Network and Information Security (NIS) Directive, with profound consequences for those to whom it applies.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

iboss Network Security

iboss Network Security

The iboss cloud is designed to deliver Network Security as a Service, in the cloud, using the best malware engines, threat feeds and log analytics engines.

Mobile Guroo

Mobile Guroo

Mobile Guroo is a strategy and systems integrator for Enterprise Mobility Management projects.

NNIT

NNIT

NNIT​ is one of Denmark’s leading consultancies in IT development, implementation and operations, including cyber security.

Bit4id

Bit4id

Bit4id provides software and systems for security and identification based on PKI technology.

IoT European Research Cluster (IERC)

IoT European Research Cluster (IERC)

IERC brings together EU-funded projects with the aim of defining a common vision for IoT technology and development research challenges.

TrustArc

TrustArc

TrustArc provide privacy compliance and risk management with integrated technology, consulting and TRUSTe certification solutions – addressing all phases of privacy program management.

TeachPrivacy

TeachPrivacy

TeachPrivacy provides computer-based privacy and data security training that is engaging, memorable, and understandable.

Ponemon Institute

Ponemon Institute

Ponemon Institute conducts independent research on data protection and emerging information technologies.

United Biometrics

United Biometrics

United Biometrics is an anonymous and real-time authentication platform designed to stop the fraud for mobile payments, e-Commerce and applications.

Haechi Audit

Haechi Audit

Haechi Audit is a leading smart contract security audit firm. We provide the most secure smart contract security audit and smart contract development services to our global clients.

Aligned Technology Solutions (ATS)

Aligned Technology Solutions (ATS)

ATS manage, monitor, and maintain everything from your network and servers to your workstations and mobile devices, and we do it proactively to eliminate downtime and keep hackers at bay.

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER) conducts full spectrum military cyberspace operations in order to enable freedom of action in cyberspace and deny the same to the adversary.

Privacy Compliance Hub

Privacy Compliance Hub

Privacy Compliance Hub provide an easy to use platform with a comprehensive data protection compliance programme including training, information, templates and reporting.

Velum Labs

Velum Labs

Velum Labs is a cyber intelligence company that provides simple and non-intrusive, cloud and cyber intelligence solutions; built from a market-leading understanding of cyber-attack methodology.

CyberloQ Technologies

CyberloQ Technologies

CyberloQ Secure is a cybersecurity solution that enables clients to implement highly robust Multi-Factor Authentication (MFA) that includes client-defined location-based geofencing constraints.

Lakera

Lakera

Lakera empowers developers and organizations to build GenAI applications without worrying about AI security risks.