News

2017-03-25

UK Accused Of 'full-frontal attack' On Whistleblowers

The Britsh government’s legal advisers have been accused of launching a “full-frontal attack” on whistleblowers in the propssed Espionage Act

2017-03-20

Law to Imprison Journalists for Publishing Leaks

Espionage Act: A new law designed to tackle international espionage could be used to imprison British journalists who obtain leaked material.

2017-02-21

Privacy Groups say FBI Hacking went too Far!

Privacy advocates are claiming in court that an FBI hacking operation to take down a child pornography site was unconstitutional and violated international law.

2017-03-22

Handbook Of Russian Information Warfare

NATO just published a new guide to Russian capabilities and intentions for combined information & cyber warfare.

2017-03-24

Snowden Says Report Proves He’s Not A Spy

Edward Snowden says reports that Russia might deport him to the US as a “gift” to Donald Trump vindicate him of charges that he is a spy.

2017-02-21

Global Banks Hit by Watering Hole Blitz

Over 100 organisations worldwide have been hit by a major new coordinated campaign using compromised websites to infect them with malware linked to the infamous Lazarus Group, according to Symantec.

2017-02-20

UK Under Attack By Russian & Chinese State Sponsored Hackers

GCHQ say that Britain is being hit by dozens of cyber-attacks a month, including attempts to steal defence and foreign policy secrets.

2017-02-17

Technology, Multilateralism, War and Peace

Wars are no longer only about combatants and tanks, but also about algorithms and bots. Opinion by Anje Kasperesen

2017-02-18

WhatsApp Becomes The Latest Victim

Is there a truly secure messaging app? Attackers could exploit a security vulnerability in WhatsApp to snoop on its users.

2017-02-20

How To Automate Cyber Defense

Humans aren’t fast enough to respond to network attacks and breaches. Machines can help us, if we help them.

2017-02-20

Deterrence & Cyber Attacks On The US Electoral System

Deterring future cyber-meddling in US elections will require convincing adversaries that the response will be painful & their efforts ineffective.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Reed Smith LLP

Reed Smith LLP

Reed Smith LLP is an international law firm with offices in the USA, Europe, Middle East and Asia. Practice areas include Information Technology, Privacy & Data Security.

Splunk

Splunk

Splunk provide real-time Security Information & Event Management solutions for Enterprise Networks, Cloud and small-scale IT environments

CloudCodes Software

CloudCodes Software

CloudCodes is a cloud security solutions provider focused on providing cloud security solutions to enterprise customers.

CERT-AM

CERT-AM

CERT-AM is the national Computer Emergency Response Team for Armenia.

BPC Banking Technologies

BPC Banking Technologies

BPC’s advanced fraud prevention solution helps card issuers and acquirers combat the growing threat by monitoring 100% of transactions, online, in real-time across all channels.

Beame.io

Beame.io

Beame.io is an information security company that distributes open source authentication infrastructure based on encryption.

RedLock

RedLock

The RedLock Cloud 360TM platform correlates disparate security data sets to provide a unified view of risks across fragmented cloud environments.

CERT NZ

CERT NZ

CERT NZ supports businesses, organisations and individuals affected by cyber security incidents, and provide trusted and authoritative information and advice.

ubirch

ubirch

The ubirch platform is designed to ensure that IoT data is trustworthy and secure.

Keynetic Technologies

Keynetic Technologies

Keynetic focuses on developing cybersecurity solutions for Industry 4.0.

Gradcracker

Gradcracker

Gradcracker is THE careers website for Science, Technology (including Cybersecurity), Engineering and Maths university students in the UK.

xMatters

xMatters

xMatters is a digital service availability platform that helps enterprises prevent, manage, and resolve IT incidents before they can become business problems.

BlueSteel Cybersecurity

BlueSteel Cybersecurity

BlueSteel is a compliance consulting firm that leverages deep system, data and application expertise to build sustainable cybersecurity solutions.

DNS Research Federation (DNSRF)

DNS Research Federation (DNSRF)

DNSRF's mission is to advance the understanding of the Domain Name System's impact on cybersecurity, policy and technical standards.

C/side (cside)

C/side (cside)

At c/side, we're creating the ultimate delivery, performance and detection mechanism for browser-side fetched 3rd party Javascript.

Pulsar Security

Pulsar Security

Pulsar Security is a team of highly skilled, offensive cybersecurity professionals with the industry's most esteemed credentials and advanced real-world experience.