News

2017-10-30

Chinese & S. Korean Regulators Says ICO Investors At Risk

The up-and-coming method of raising funding via tokens based on the cryptocurrency Ethereum is unregulated with a huge potential for fraud.

2017-10-27

A New Approach To Combat Phishing

Major data breaches can start with a simple email. But providing employee training to combat phishing is a failing strategy.

2017-10-27

Facial Recognition Works on iPhone X. Sometimes.

The iPhone X might be the future of Apple’s smartphone design but its innovative Face ID struggles with under 13s, siblings or twins.

2017-10-27

Postmortem: WannaCry Ransomware Explained

WannaCry ransomware consists of multiple components infecting Windows operating systems. But the speed of its spread is something special.

2017-10-26

Innovation in Cloud-Based Video Analytics

Video analytics for the security industry is going through a rapid technological shift to smarter cloud-based, real-time and pro-active systems.

2017-10-26

Healthcare Suffers Most Cyber Security Incidents

McAfee say the healthcare industry is highly vulnerable and accounted for 26 percent of security incidents in the second quarter of 2017.

2017-10-26

US Asks China Not to Enforce Cybersecurity Law

The US has asked China not to implement its new cyber security law over concerns it could damage global trade in services.

2017-10-10

China Disrupts WhatsApp

The messaging service WhatsApp has been disrupted in China as the government steps up security ahead of the Communist Party Congress.

2017-10-25

Poor Coding Limits IS Hackers

Buggy Malware & Poor Encryption: Hackers working for Islamic State are bad at coding and and at hiding what they do.

2017-10-25

Nuclear Missiles Are Not N.Korea’s Only Threat

North Korea has launched 22 missiles in 15 tests in 2017. But the true risk is lies in its cyberattack capabilities, which are in very active service.

2017-10-24

Multicloud - The Next Step In Cloud Computing

Multicloud is an emerging pattern of use for cloud computing, when enterprises want to avoid dependence on a single public cloud provider.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Morgan Lewis Law

Morgan Lewis Law

Morgan Lewis is an international law firm with offices in North America, Europe, Asia, and the Middle East. Practice areas include Privacy and Cybersecurity.

Professional Information Security Association (PISA)

Professional Information Security Association (PISA)

PISA is an independent and not-for-profit organization for information security professionals, with the primary objective of promoting information security awareness and best practice.

Identity Automation

Identity Automation

Identity Automation is a leading provider of Identity and Access Management software.

Clym

Clym

Clym is the data privacy platform that helps organisations meet their data protection obligations. Cookies, Consent, Requests, Policies and more are all managed in a secure and adaptive application.

Zuratrust

Zuratrust

Zuratrust provide protection for all kinds of email related cyber attacks.

Asset Guardian Solutions (AGSL)

Asset Guardian Solutions (AGSL)

Asset Guardian are dedicated to protecting the integrity of process control systems software that is used to control operations and production processes.

UnderDefense

UnderDefense

UnderDefense provides cyber resiliency consulting and technology-enabled services to anticipate, manage and defend against cyber threats.

Redpoint Security

Redpoint Security

Redpoint Security is an application security consulting firm that is focused on all aspects of code security.

Cyber Security Works (CSW)

Cyber Security Works (CSW)

Cyber Security Works is your organization’s early cybersecurity warning system to help prevent attacks before they happen.

Nine23

Nine23

Nine23 are a highly focused cyber security solutions company that defines, builds and manages innovative services, enabling end-users to use technology securely in today’s workplace.

Astrill VPN

Astrill VPN

Astrill VPN is a Seychelles based Virtual Private Network(VPN) Company.

Open Web Application Security Project (OWASP)

Open Web Application Security Project (OWASP)

The Open Web Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software.

Summit 7 (S7)

Summit 7 (S7)

Summit 7 is a national leader in cybersecurity, compliance, and managed services for the Aerospace and Defense industry and corporate enterprises.

Communications Fraud Control Association (CFCA)

Communications Fraud Control Association (CFCA)

CFCA is the premier International Association for fraud risk management, fraud prevention and profitability control.

ESProfiler

ESProfiler

Enterprise Security Profiler. Empowering CISOs with clarity & confidence in their security programme by visualising capabilities, usage and spend against their key threat priorities.

GovSky

GovSky

GovSky streamlines CMMC compliance, saving time and significantly reducing cost.