News

2017-06-21

Advice For Cyber Insurance Buyers

Companies interested in securing cyber insurance should know that the underwriting process requires them to do careful due diligence.

2017-06-22

Power Companies Cyber ‘Nightmare’

CrashOverride: Seven minutes before midnight last December a bomb of sorts went off in a high voltage substation north of Kiev.

2017-06-21

Cybersecurity Can Learn From Maritime Security

The Internet is similar to the oceans and seas and cybersecurity crosses boundaries similar to drug smuggling and piracy.

2017-06-23

Binky: An Anti-Social Media Simulator

Flame-wars, bad news, fake news, worse news and anxiety-fueling comment sections mean that social media is no longer the escapism it once was.

2017-07-04

RBS Bank Warns Of Increased Cybercrime

Last year, there were more than 1.8million reported cases of financial fraud, with losses of more than £768million across Britain.

2017-07-03

News & Sports Websites 'vulnerable to attack'

News and sports websites have some of the lowest levels of security. Less than 10% use basic security protocols such as HTTPS and TLS.

2017-06-30

Chinese Criminals Are Selling Your Apple Data

A criminal operation run by employees of an Apple “domestic direct sales company and outsourcing company” has been uncovered in China.

2017-06-21

Intel's Data Solutions For Military & Commercial Use

Intel has been selected by DARPA to develop a powerful new data analysis platform that will use machine learning and other AI techniques.

2017-06-23

Czechs Must Get Ready for Offensive Cyberwar

Czech security chief wants to create the necessary capacities to attack its enemy's cyber infrastructure in the case of an online attack.

2017-06-26

Getting Threat Intelligence Right

Threat intelligence is essential to alert security analysts to threats that are proliferating but have yet to infiltrate company networks.

2017-06-22

Cybersecurity Threats Are Changing Recruitment

Security awareness, data analysis and analytic skills: Cybersecurity threats and increased hacking are changing the job skills employers look for.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

International Security Management Association (ISMA)

International Security Management Association (ISMA)

ISMA is an international security association of senior security executives from major business organizations located worldwide.

National Cyber Security Centre (CNCS) - Portugal

National Cyber Security Centre (CNCS) - Portugal

CNCS is the operational coordinator and Portuguese national authority in cybersecurity working with State entities, and digital service providers

Black Kite

Black Kite

Black Kite (formerly NormShield) provides comprehensive Security-as-a-Service solutions focused on cyber threat intelligence, vulnerability management and continuous perimeter monitoring.

Xage Security

Xage Security

Xage is the world’s first blockchain-protected security platform for Industrial IoT.

Cybersecurity Competence Center (C3)

Cybersecurity Competence Center (C3)

The Cybersecurity Competence Center was created to further strengthen the Luxembourg economy in the field of cybersecurity.

International Accreditation Forum (IAF)

International Accreditation Forum (IAF)

The IAF is the world association of Conformity Assessment Accreditation Bodies. Its primary function is to develop a single worldwide programme of conformity assessment.

US Venture Partners (USVP)

US Venture Partners (USVP)

USVP is a leading Silicon Valley venture capital firm focusing on early-stage start-ups that transform cybersecurity, enterprise software, consumer mobile and e-commerce, and healthcare.

Accelerator Frankfurt

Accelerator Frankfurt

Accelerator Frankfurt is an independent go-to-market program focused on Fintech, Cybersecurity and Digital B2B startups.

Point Predictive

Point Predictive

Point Predictive build Predictive Models using Artificial Intelligence and Machine Learning techniques that help our customers stop fraud and early payment default (EPD).

PreEmptive Solutions

PreEmptive Solutions

PreEmptive Protection hit the sweet spot between cost, convenience and functionality by helping you protect and secure your apps in a smarter way.

GateKeeper Enterprise

GateKeeper Enterprise

The GateKeeper Enterprise software is an identity access management solution. Automated proximity-based authentication into computers and websites. Passwordless login and auto-lock PCs.

Dynatrace

Dynatrace

Dynatrace provides software intelligence to simplify cloud complexity and accelerate digital transformation.

MetaCert

MetaCert

MetaCert’s Zero Trust browser software reduces the risk of organizations being compromised with a phishing-led cyberattack by more than 98%.

Kape Technologies

Kape Technologies

Kape Technologies is a cybersecurity company focused on helping consumers around the world have a better digital experience with greater privacy and protection.

Forta

Forta

Forta is a real-time detection network for security & operational monitoring of blockchain activity.

Resemble AI

Resemble AI

Resemble AI is an innovator in Generative Voice AI technology and tools to combat AI fraud including audio watermarking and deepfake detection.