News

2017-05-03

Google Acts Against Fake News

Google announces its first attempt to combat the circulation of “fake news” on its search engine using new tools.

2017-05-02

Cybersecurity Trends For Boards & Directors

Directors find themselves in unfamiliar territory when it comes to formulating policies & oversight processes that address cybersecurity risk.

2017-05-02

Technology Can Not Diminish Insider Threats By Itself

The key to reducing insider threats lies in understanding the individual’s mindset and having robust monitoring on that person's systems & data.

2017-05-02

Ten Myths About Cybercrime

Don't let cybersecurity fantasy stop you from building the effective countermeasures you need to protect your organisation from attack.

2017-05-02

Snowden Can Stay In Russia For As Long As He Likes

The former NSA contractor has been living in Russia since 2013, after leaking thousands of classified intelligence documents and fleeing the US.

2017-05-02

EU / US Privacy Shield Affects Your Organisation

Although we live in a world where data transfer is easier from a technical standpoint, location is increasingly important from a legal perspective.

2017-05-01

Teenagers And Cybercrime

More teenagers are getting involved in cybercrime. Many do it for fun without realising the consequences, but the penalties can be severe.

2017-05-01

Get Ready: Robots Will Destroy Jobs

Robotics promises to be the most profoundly disruptive technological shift since the industrial revolution.

2017-04-28

Over 60% Of UK Businesses Lack Any Real Cyber Security

Cyber Security Breaches Survey 2017: Virtually all UK businesses surveyed are exposed to some kind of cybersecurity risk.

2017-04-28

US Intelligence Agencies Fear Insiders As Much As Spies

Forget about spies. It's rogue insiders that cause heartburn at US intelligence agencies these days.

2017-04-27

Fake Police Ransomware Scam

Cyber criminals used JavaScript to trick Apple Safari web users into believing that their devices were compromised by police ransomware.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ThreatConnect

ThreatConnect

ThreatConnect is an enterprise threat intelligence platform by Cyber Squared bridging incident response, defense, and threat analysis for InfoSec & DFIR teams.

Anomali

Anomali

Anomali delivers intelligence-driven cybersecurity solutions to enhance threat visibility, automate threat processing and detection, and accelerate threat investigation, response, and remediation.

National Agency for Information & Communication Technologies (ANTIC) - Cameroon

National Agency for Information & Communication Technologies (ANTIC) - Cameroon

ANTIC is responsible for regulating the activities of electronic security and regulation of the Internet in Cameroon.

Advantech

Advantech

Advantech is a leader in providing trusted innovative embedded and automation products and solutions. Activities include IoT security.

ShadowDragon

ShadowDragon

ShadowDragon develops digital tools that simplify the complexities of modern investigations that involve multiple online environments and technologies.

Philippine National Police Anti-Cybercrime Group (PNP-ACG)

Philippine National Police Anti-Cybercrime Group (PNP-ACG)

The mission of the PNP Anti-Cybercrime Group is to implement and enforce pertinent laws on cybercrime and other cyber related crimes and pursue an effective anti-cybercrime campaign.

NSEIT

NSEIT

NSEIT offers end-to-end Information Technology products, solutions and services including cybersecurity to organizations in the financial sector.

CyberGRX

CyberGRX

The CyberGRX Exchange and our risk assessments-as-a-service help Enterprises and Third Parties cost-effectively identify, prioritize and mitigate risk.

VIPRE Security Group

VIPRE Security Group

VIPRE Security Group is an award-winning global cybersecurity, privacy and data protection company.

CyberSat Summit

CyberSat Summit

CyberSat is dedicated to fostering the necessary discussions to flesh out and develop solutions to cyber threats in the satellite industry.

ePLDT

ePLDT

ePLDT delivers best-in-class digital business solutions that include Cloud, Cyber Security, purpose-built Data Center facilities and Managed IT Services.

Client Solution Architects (CSA)

Client Solution Architects (CSA)

Client Solution Architects (CSA) is a leading digital transformation consulting firm focused on the U.S. Defense Department and all U.S. Federal enterprise information technology service areas.

Verica

Verica

Verica uses chaos engineering to make systems more secure and less vulnerable to costly incidents.

Yotta Infrastructure Solutions

Yotta Infrastructure Solutions

Yotta Infrastructure, a Hiranandani group company, provide Datacenter Colocation and Tech Services such as Cloud services, Network & Connectivity, IT Security and IT Management services.

Unit 42

Unit 42

Unit 42 brings together world-renowned threat researchers, incident responders and security consultants to create an intelligence-driven, response-ready organization.

Badge

Badge

Badge authenticates you on-demand for every application, on any device, without storing any secrets.