News

2017-05-23

US Reduces Crime Rates Using Effective IT

Crime has fallen dramatically over the past 20 years, primarily due to the technological changes which have made it harder to commit crime.

2017-05-22

WannaCry Attack Is A Big Wake-Up Call

The ransomware attack highlights a dependence on interconnected technology & the massive challenge to secure the software systems we rely on.

2017-05-22

Hackers Came, But the French Were Prepared

President Macron's campaign team thwarted Russian hackers, showing a level of ingenuity missing in Hillary Clinton’s failed presidential campaign.

2017-05-16

What Every CISO Needs To Know

Enterprises are under an endless stream of cyber attacks. The sophistication of these attacks is evolving and prioritization is essential.

2017-05-16

Microsoft, Kaspersky & Symnantec Weigh In On WannaCry Ransomware

Top security firms have found evidence linking the WannaCry ransomware to the prolific North Korean Cybergang known as Lazarus Group.

2017-05-17

Systemic Cyber Attacks Most Likely In Finance & Energy Industries

Experts at insurance giant AIG have identified the industry sectors at highest risk to systemic threats.

2017-05-22

Rapid Detection Is Key To Cyber Attacks On Business

There are now so many cyberattacks that many enterprises simply accept that hackers and bad actors will find ways to break into their systems.

2017-05-22

Just Who Are Russia's Cyber Warriors?

Their chosen false names, like 'Cozy Bear', 'The Dukes' and 'APT29' make them sound like street gangs. The reality is somewhat different.

2017-05-22

What Happens If Criminals & Terrorists Get To Use AI

A Sinister Agenda: Criminals could deploy Artificial Intelligence to commit "terrorist acts or murders".

2017-05-23

What Healthcare CISOs Should Know

Protected health information (PHI) is more lucrative on the dark web than other form of personally identifiable information.

2017-05-29

Three Cybersecurity Trends Business Should Address

The cybersecurity landscape grows more complex daily: Hackers unleash increasingly intricate & formidable attacks, on mission critical systems.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CyberArk Software

CyberArk Software

CyberArk is an established leader in privileged access management and offers the most complete set of Identity Security capabilities.

British Assessment Bureau

British Assessment Bureau

The British Assessment Bureau is an ISO certification body. We check conformity and compliance of companies to recognised ISO standards including ISO 27001.

CERT.AZ

CERT.AZ

The national Cyber Security Center of the Republic of Azerbaijan.

Privitar

Privitar

Privitar is leading the development and adoption of privacy engineering technology enabling our customers to innovate and leverage data with an uncompromising approach to data privacy.

Volatility Foundation

Volatility Foundation

Volatility is an open source memory forensics framework for incident response and malware analysis.

RFA

RFA

RFA is a unique IT, financial cloud and managed cyber-security provider to the financial services and alternative investment sectors.

National CyberWatch Center

National CyberWatch Center

National CyberWatch Center is a cybersecurity consortium working to advance cybersecurity education and strengthen the national workforce.

Aristi Labs

Aristi Labs

Aristi Labs provides comprehensive security solutions to help businesses protect data and intellectual property, minimizing downtime and maximizing productivity.

Detego Global

Detego Global

Detego Global are the creators of the Detego® Unified Digital Forensics Platform, a suite of modular tools used globally by military, law enforcement and intelligence agencies, and enterprises.

UK Cyber Cluster Collaboration (UKC3)

UK Cyber Cluster Collaboration (UKC3)

UKC3 has been launched to support Cyber Clusters and encourage greater collaboration across regions and nations of the UK.

ExchangeDefender

ExchangeDefender

ExchangeDefender provides cybersecurity services that secures your company email and data, and guarantees 24/7 email access.

IGI Cybersecurity

IGI Cybersecurity

IGI Cybersecurity delivers people-driven cybersecurity for personalized, resilient cyber defense focused on individualized strategy and unshakeable partnership.

OryxLabs

OryxLabs

OryxLabs provide advanced enterprise digital risk protection solutions. Learn more about how 24x7 continuous assessment, monitoring, and improvement can secure your network.

CipherStash

CipherStash

CipherStash is a complete data governance and breach prevention platform.

Mantodea Security

Mantodea Security

Mantodea Security is an industry-agnostic powerhouse backed by extensive experience and expertise in the realm of IT security.

WillCo Tech

WillCo Tech

WillCo Tech works to enhance national security and force readiness for military and commercial enterprises with a suite of software capabilities surrounding the human element of cybersecurity.