News

2017-07-27

Three Most In-Demand Cybersecurity Jobs

Cybersecurity jobs rank among the most difficult to fill in any enterprise, with the talent gap expected to reach 1.8 million jobs by 2022. It's a candidates market.

2017-07-27

Trump Tells US Cyber Command To Get More Aggressive

The Trump administration is pushing forward with its plan to make US Cyber Command increase the nation’s offensive and defensive cyber capabilities.

2017-07-27

NSA Has Done Little To Prevent The Next Edward Snowden

When he walked out of the NSA with some of its most secret files, the agency didn't have a list of people who had privileged access to its networks.

2017-07-26

Key Concepts For Understanding Artificial Intelligence

AI has innovative uses across all industry segments, helping diagnose and solve problems faster and enabling consumers to do amazing things.

2017-07-26

US Steps Up Its Cyberwar Capability

The NSA and Cyber Command to separate, reforming the chain of command for defensive & offensive cyber operations to combat IS and other foes.

2017-07-26

Australia Wants Technology Businesses To Act On Extremism

Australian PM tells Internet companies to move faster to remove extremist content and to address the “problem” of encrypted messages.

2017-07-26

Predicting Crime From Open Source Data

The criminal justice system produces reams of data and a new crime prediction technology is being deployed that is transforming policing.

2017-07-25

Can We Stop Algorithms Telling Lies?

Most important moments where people interact with large bureaucratic systems involve an algorithm in the form of a scoring system. That's a problem.

2017-07-24

Global Cyber Attack Could Cost $53Billion.

Insurance experts at Lloyds calculate that the cost of a major cyber attack would equal the economic losses from a catastrophic natural disaster.

2017-07-24

Dark Web Marketplaces Shut Down

AlphaBay and Hansa, two of the largest “dark web” marketplaces for illegal and illicit items such as drugs and guns, have been shut down.

2017-07-25

Cyber Warfare Takes A New Turn

The recent ransomware attacks are masking a bigger issue in cyberwar - which is that chaos and disruption on the Internet are the new normal.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

TraceSecurity

TraceSecurity

TraceSecurity, a leading pioneer in cloud-based security solutions, provides IT governance, risk and compliance (GRC) management solutions.

Momentum Cyber

Momentum Cyber

Momentum Cyber provides world-class M&A and strategic advice combined with unparalleled senior-level access to the Cybersecurity ecosystem.

i-Sprint Innovations

i-Sprint Innovations

i-Sprint is a leader in Securing Identity and Transactions in the Cyber World for industries that are security sensitive.

Squalio

Squalio

Squalio is an information technology group that delivers solutions and services for secure and effective IT management.

Cybersecurity Tech Accord

Cybersecurity Tech Accord

The Cybersecurity Tech Accord promotes a safer online world by fostering collaboration among global technology companies.

Genians

Genians

Genians provides the industry’s leading Network Access Control (NAC) solution, which ensures full visibility of all IP-enabled devices regardless of whether they are wired, wireless, or virtual.

UKAS

UKAS

UKAS is the national accreditation body for the UK. The directory of members provides details of organisations offering certification services for ISO 27001.

Axcient

Axcient

Axcient offers MSPs the most secure backup and disaster recovery technology stack with a proven Business Availability suite.

White Hawk Software

White Hawk Software

White Hawk provides code tamper-proofing solutions to protect mission critical software applications from malicious and Zero day attacks and reverse engineering at run time.

Broadcom

Broadcom

Broadcom is a global technology leader that designs, develops and supplies a broad range of semiconductor and infrastructure software solutions.

Cyber Lockout

Cyber Lockout

Comprehensive ransomware insurance and preventative cybersecurity technology solution, working together to help protect businesses 24/7/365.

Debevoise & Plimpton

Debevoise & Plimpton

Debevoise & Plimpton LLP is a premier law firm with market-leading practices in areas including Data Strategy & Security.

Mitigo Group

Mitigo Group

Mitigo offers a well considered and effective approach to keeping businesses completely secure from any digital attacks.

EPIQ Infotech

EPIQ Infotech

EPIQ Infotech is a trusted consulting and implementation partner for Oracle JD Edwards and Amazon Web Services (AWS).

Var Group

Var Group

Var Group is one of the main partners for innovation in the ICT sector in Italy.

CyRiSo

CyRiSo

CyRiSo is a cyber security consulting company with a focus on 'as-a-service' services for the most pressing challenges of cyber security.