News

2017-06-14

North Korea, WannaCry, Cyberattacks And Lazarus

Who is really to blame? For many, it seems that question has already been solved: It was North Korea. Except the evidence is not conclusive.

2017-06-13

SMEs And Cyber Insurance

Small and medium businesses rely on partners and they face a growing range of online challenges. Cyber Insurance has a key role to play.

2017-06-13

NATO Could Go To War In Response To A Cyber Attack

A persistent and devastating attack could trigger what is known as Article 5, NATO’s collective defense measure.

2017-06-12

Putin Applauds Patriotic Russian Hackers

Putin: "patriotic" citizens might be engaged in hacking. Such individuals are joining "the justified fight against those speaking ill of Russia,"

2017-06-12

French Security Chief Warns of Permanent Cyber War

France's top cyber spy says there is risk of "permanent war" in cyberspace as a result of hacking for espionage and fraud by states & criminals.

2017-06-09

UK’s Trident Nuclear Subs Vulnerability To Hackers

The Royal Navy Trident submarine fleet is vulnerable to a “catastrophic” cyber attack that could render Britain’s nuclear weapons useless.

2017-06-09

Leaked NSA Report Claims Russian 'Cyber Espionage' Against US Elections

At least one company providing software for the electoral process was targeted and 100 local election officials targeted by spear-phishing emails.

2017-06-09

Islamic State's Social Media Strategy

So called Islamic State is fighting on many fronts and puts media warfare on a par with its battle on the ground.

2017-06-12

Uber In Legal Fight With Google

Uber has fired the engineer accused of stealing secrets from Google after he failed to assist with an investigation related to the lawsuit.

2017-06-09

How To Integrate Threat Intelligence

In a complicated, fast-paced cyber environment, it's difficult to hunt for vulnerabilities. Automating threat intelligence can help you find them.

2017-06-12

Cyberspies: The Secret History of Surveillance, Hacking And Digital Espionage

The intertwining forces of computers & espionage are reshaping the world; what was once the preserve of intelligence agencies now affects us all.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CoSoSys Endpoint Protector

CoSoSys Endpoint Protector

Endpoint Protector by CoSoSys is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks and protects from malicious data theft.

DKCERT

DKCERT

DKCERT (Danish Computer Security Incident Response Team) is a service of DeIC (Danish e-Infrastructure Cooperation).

AA Certification (AAC)

AA Certification (AAC)

AAC provide ISO Quality Management System certification services including ISO 27001.

Engineering Group

Engineering Group

Engineering is the Digital Transformation Company, a leader in Italy and with over 80 offices across Europe, the United States, and South America.

ID Agent

ID Agent

ID Agent provides a comprehensive set of threat intelligence and identity monitoring solutions.

Chainalysis

Chainalysis

Chainalysis provides blockchain analysis software to prevent, detect and investigate cryptocurrency money laundering, fraud and compliance violations.

TeskaLabs

TeskaLabs

TeskaLabs is a software vendor of cybersecurity and data privacy products.

Evalian

Evalian

Evalian is a data protection services provider. Working with organisations of all sizes, we specialise in Data Protection, GDPR, ISO Certification & Information Security.

OmniCyber Security

OmniCyber Security

Omni is a cyber security firm specialising in Penetration Testing, Managed Security and Compliance.

SEMNet

SEMNet

SEMNet is an IT solutions provider and an infrastructure and security consulting firm.

Noblis

Noblis

Noblis is a dynamic science, technology, and strategy organization dedicated to creating forward-thinking technical and advisory solutions in the public interest.

Technivorus Technology

Technivorus Technology

Technivorus is a deep-tech firm delivering customized Cybersecurity, Digital Marketing, Web & App Development, and multifarious IT services for businesses across the globe.

Forensic IT

Forensic IT

Forensic IT is a specialised cyber security firm with expertise in Digital Forensics and Incident Response (DFIR).

Frenos

Frenos

The Frenos Platform helps enterprises understand their most probable attack paths while highlighting the most effective risk mitigations to deter and defend against today’s adversaries.

SecAI

SecAI

SecAI is an innovative threat intelligence-driven, and AI-powered vendor aiming at cyber threat detection and response.

CyberUpgrade

CyberUpgrade

CyberUpgrade is on a mission to empower executives to gain control over their organization’s cybersecurity.