News

2017-06-30

Petya Cyber Attack Update

“Petya” ransomware has caused serious disruption at large firms and paying the ransom does not work. Take defensive action.

2017-06-30

How A Nation Became Russia's Cyberwar Experiment

Blackout: In Ukraine, the quintessential cyberwar scenario has come to life.

2017-06-30

WannaCry Returns To Attack Honda

Lingering Effects: Car giant Honda's manufacturing operations suffer a temporary shut down weeks after the initial attack wave.

2017-06-30

Scenarios For Predicting Terrorist Attacks

Suicide bombings, random attacks on soft targets and the use of vehicles in ramming attacks, reflect the enlistment of recruits via social media.

2017-06-30

India Internet Shutdowns 'Violate Human Rights'

The Indian government has started to use arbitrary powers to shutdown telecoms networks, including the internet to quell public disorder.

2017-06-29

Petya Cyber Attack Hits EU & US

Victims of a major ransomware attack that has spread through the US and Europe can no longer unlock their computers, even if they pay the ransom.

2017-06-29

Does Canada Need Its Own CIA Or MI6?

Canada is the only G7 country without both a dedicated domestic and a dedicated foreign intelligence agency. Up until now.

2017-06-29

Industrial Robotics Market Will Triple

This year, the market value of industrial robots worldwide is estimated to hit $14 billion. By 2025, that market is projected to balloon to $33.8 billion.

2017-06-29

Cybersecurity Is A Bigger Issue Than Brexit

Cybersecurity is a top concern in the boardroom, to the point where it’s a more important issue than Brexit.

2017-06-28

Want A Career In Cybersecurity?

A growing cyber threat landscape and an estimated 1 million unfilled cybersecurity jobs worldwide means career opportunities are wide open.

2017-06-28

Intelligence-Led Policing Gets Automated

An Electronic Detective: VALCRI is a semi-automated analysis system that can reconstruct crime situations, generate insights and discover leads.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Arxan Technologies

Arxan Technologies

Arxan is a leader of application attack-prevention and self-protection products for Internet of Things (IoT), Mobile, Desktop, and other applications.

Cura Software Solutions

Cura Software Solutions

Cura Software Solutions (formerly Cura Technologies) is a market-leader in Governance, Risk and Compliance (GRC) enterprise applications.

Intezer Labs

Intezer Labs

The only solution replicating the concepts of the biological immune system into cyber-security. Intezer provides enterprises with unparalleled Threat Detection and accelerates Incident Response.

Kapalya

Kapalya

Kapalya empowers businesses and their employees to securely store sensitive files at-rest and in-transit across multiple platforms through a user-friendly desktop and mobile application.

Capy

Capy

Capy's SaaS-based security solutions will protect your website from bots, spam, humans and more.

Seekurity

Seekurity

Seekurity is an information security consulting firm specialized in all areas of Cyber Security including Penetration Testing, Vulnerability Assessments and Risk Management.

Veriff

Veriff

Veriff provides highly-automated identity-verification services that prevent fraud like nothing else on the market.

Neudomains

Neudomains

Neudomains is a Corporate Domain Name Management and Brand Protection Online Specialist. One of the world's top providers of online brand protection and enforcement.

NuID

NuID

NuID is a pioneer in trustless authentication and decentralized digital identity.

Strike Graph

Strike Graph

The Strike Graph GRC platform enables Security Audits & Certifications.

BaXian Group

BaXian Group

BaXian AG is an international consulting company specializing in IT security, data analytics, risk management and compliance.

Mitigate Cyber

Mitigate Cyber

Mitigate Cyber (formerly Xyone Cyber Security) offer a range of cyber security solutions, from threat mitigation to penetration testing, training & much more.

Sunday Cyber

Sunday Cyber

Sunday is a personal cybersecurity platform, built to protect the world’s top executive teams beyond the enterprise perimeter.

Foghorn Consulting

Foghorn Consulting

Foghorn can analyze your cloud to enhance performance and security, while reducing costs. Based on AWS’ 6 Pillars, our AWS WAFR Certified Engineers Will Identify Areas of Improvement.

DeltaSpike

DeltaSpike

DeltaSpike empowers individuals and organizations worldwide through its comprehensive cybersecurity solutions.

runZero

runZero

runZero delivers the most complete security visibility possible, providing you the ultimate foundation for successfully managing exposures and compliance.