News

2017-10-26

US Asks China Not to Enforce Cybersecurity Law

The US has asked China not to implement its new cyber security law over concerns it could damage global trade in services.

2017-10-10

China Disrupts WhatsApp

The messaging service WhatsApp has been disrupted in China as the government steps up security ahead of the Communist Party Congress.

2017-10-25

Poor Coding Limits IS Hackers

Buggy Malware & Poor Encryption: Hackers working for Islamic State are bad at coding and and at hiding what they do.

2017-10-25

Nuclear Missiles Are Not N.Korea’s Only Threat

North Korea has launched 22 missiles in 15 tests in 2017. But the true risk is lies in its cyberattack capabilities, which are in very active service.

2017-10-24

Multicloud - The Next Step In Cloud Computing

Multicloud is an emerging pattern of use for cloud computing, when enterprises want to avoid dependence on a single public cloud provider.

2017-10-24

What is Big Data? - Everything You Need To Know

Every day human beings eat, sleep, work, play, and produce data, lots and lots of data. 2.5 quintillion, (25 billion x billion), bytes of data a day.

2017-10-23

Singapore: The Place To Launch Cyber Attacks From

High Connectivity:Singapore has overtaken other nations including the US, Russia & China as the country launching the most cyber attacks globally.

2017-10-23

Why Do IT Projects Often Fail?

Despite new methodologies and management techniques to head off spectacular failures, critical technical initiatives still fall flat at an alarming rate.

2017-10-20

Big Data In The Service of Police

Dragnet Surveillance & Predictive Policing: Big data analytics both amplifies and transforms police surveillance practices.

2017-10-20

Russia Plans To Shut Facebook For Its Election

Russia’s communications watchdog has threatened to shut down Facebook if it fails to comply with a controversial law on data storage.

2017-10-20

Firefighters Get AR Powered Glasses

Firefighters could go further into hazardous situations and exit safely using Augmented Reality (AR) glasses in development at BAE Systems.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cifas

Cifas

Cifas are leaders in fraud prevention, working closely with UK law enforcement partners.

Siepel

Siepel

Siepel manufactures high quality shielded rooms and anechoic chambers dedicated to TEMPEST, NEMP & HIRF.

CSIS Security Group

CSIS Security Group

CSIS provide actionable threat intelligence, prevention, incident response and 24/7 managed security services.

Exonar

Exonar

We enable organisations to better organise their information, removing risk and making it more productive and secure.

TrainACE

TrainACE

TrainACE, is a professional computer training school offering courses in information technology with a focus on Advanced Security training.

FirstPoint Mobile Guard

FirstPoint Mobile Guard

FirstPoint Mobile Guard has developed the market’s most advanced solution for securing cellular devices, including mobile phones and IoT products, by blocking malicious data leakage.

Cyber Smart Defense

Cyber Smart Defense

Cyber Smart Defense is a specialist provider of penetration testing services and IT security audits.

Humming Heads

Humming Heads

Humming Heads offers a complete solution to fight the advanced threats that target a company's endpoints and servers.

Pentesec

Pentesec

Pentesec is a security specialist offering professional services, managed security services and expertise within an extensive range of security technologies.

LiveAction

LiveAction

LiveAction provides end-to-end visibility of network and application performance from a single pane of glass.

Nine23

Nine23

Nine23 are a highly focused cyber security solutions company that defines, builds and manages innovative services, enabling end-users to use technology securely in today’s workplace.

Cylab - Carnegie Mellon University

Cylab - Carnegie Mellon University

Carnegie Mellon University CyLab is the University's security and privacy research institute.

Theta

Theta

Theta is a New Zealand owned technology consultancy. Our team of over 330 experienced professionals help organisations transform with technology.

Orchestrate Technologies

Orchestrate Technologies

Orchestrate Technologies provides computer network and IT managed services for small and mid-market clients as well as small enterprise businesses.

Qi An Xin (QAX)

Qi An Xin (QAX)

QAX is a listed company based in China, and a leader in cybersecurity industry, providing new generation enterprise-level and national-level cybersecurity solutions.

STACK Cybersecurity

STACK Cybersecurity

STACK Cybersecurity serves as a strategic partner, guiding you through the intricate and dynamic cybersecurity landscape.