News

2017-10-04

A Global Issue: Cybercrime In Singapore

Cybercrime in Singapore nearly doubled between 2014 and 2016 and it is a penalty of a high level of connectivity.

2017-10-04

The Shifting Sands of Cybersecurity

Today’s security teams need to come up with new tactics to fend off more advanced threats from increasingly interconnected enterprise networks.

2017-10-04

What is Big Data?

When people talk about big data, they mean the ability to take large portions of data, analyse it and make it useful. But it is really more than that.

2017-10-03

AI Makes People In Your Business More Important

AI is already a part of consumer applications and is fast becoming a larger part of our work environment. But if you want subtlety, get a human.

2017-10-03

In The House Or In The Cloud: Which Is More Secure?

There are many reasons to deliberate carefully before choosing an in-house or cloud service delivery model.

2017-10-02

Big Data - Big Changes Coming

There is one hurdle to the rapid growth of data; the shortage of highly skilled individuals who can analyse and crunch the data to make it valuable.

2017-10-02

Local Government Computer Systems Are Soft Targets

Even a small vulnerability can lead to big problems. A hack affecting NY state police illustrates the vulnerability of local government networks.

2017-10-02

Robots Take Over The World’s Work

For so many jobs, machines are faster, more consistent, smarter, and cheaper than you or I will ever be. So why not tax them?

2017-09-29

AI Is Streamlining Marketing & Sales

Artificial Intelligence and autonomous algorithms are making and saving money every day for the businesses that deploy them.

2017-09-29

Put Your Physical Security Into The Cloud

The cloud revolution has the potential to change every aspect of physical security, offering ways of doing things that never existed before.

2017-09-29

India Cracks Down On Drones

India will upgrade its airports and airstrips in view of the unregulated use of drones and the constant threat from terror groups.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Akin Gump Strauss Hauer & Feld

Akin Gump Strauss Hauer & Feld

Akin is a leading global law firm providing innovative legal services and business solutions to individuals and institutions. Practice areas include Cybersecurity, Privacy and Data Protection.

Hitachi ID Systems

Hitachi ID Systems

Hitachi ID Systems offers comprehensive identity management and access governance, privileged access management and password management solutions.

Uniken

Uniken

Uniken REL-ID is a safe, simple, and scalable security platform that tightly integrates your identity, authentication, and channel security.

Verve Industrial

Verve Industrial

Verve specialize in providing software and services to help protect and secure critical industrial control systems.

Hypersecu Information Systems

Hypersecu Information Systems

Hypersecu Information Systems, Inc. is a solution provider dedicated to multi-factor authentication, public key infrastructure and software copyright protection.

Ponemon Institute

Ponemon Institute

Ponemon Institute conducts independent research on data protection and emerging information technologies.

Tutamantic

Tutamantic

Tutamantic develops software that reduces security risks and weaknesses during the architectural and design stages.

Capsule8

Capsule8

Capsule8 is the only company providing high-performance attack protection for Linux production environments.

Cyble

Cyble

Cyble Vision enables faster detection of cyber threats and focuses on identifying and analysing the motivations, methods, capabilities and tools of adversaries.

About Cyber Security.

About Cyber Security.

About Cybersecurity provides a galaxy-wide knowledge base of cybersecurity tactics and techniques derived from actual experience.

Naq Cyber

Naq Cyber

Naq is the number one platform for SMEs looking to become legally compliant and protect against cybercrime and other data-related incidents.

Anterix

Anterix

Anterix is focused on empowering the modernization of critical infrastructure and enterprise businesses by enabling private broadband connectivity.

Ghost Security

Ghost Security

Ghost is a venture backed, product-led startup building the new standard in application security for the modern enterprise.

Cyberguardians

Cyberguardians

Cyberguardians is a team of experienced cybersecurity experts and consultants who always believe in the value and a high level of cybersecurity services to clients.

AnzenSage

AnzenSage

AnzenSage is a cybersecurity advisory consultancy specializing in security risk resilience for the food sector: agriculture, food manufacturing, food supply chain, vineyards, and wineries.

V2X

V2X

V2X delivers IT support, networking, and cybersecurity solutions that ensure optimal mission support and performance.