News

2017-02-13

Hologram Technology Is Finding Military Users

Microsoft’s HoloLens hologram headset systems are already being used in the Australian, Ukrainian and Israeli armies.

2017-03-01

Suspect Monitoring & Surveillance Technology

NEC Are Looking Out For Criminal Activity: Monitoring and analysing suspicious behavior has become a pressing need for law enforcement.

2017-02-10

Blockchain’s Brilliant Approach To Cybersecurity

The Blockchain’s alternative approach to storing and sharing information provides a tool to prevent cyberattacks and to maintain security.

2017-03-03

Only In Texas: Ransomware Steals Data From Police

Ukrainian-based hackers hold a local Texas Police Force network server for ransom, resulting in the loss of video evidence.

2017-03-02

Computer Says No

An Artificial Intelligence watchdog should be set up to ensure people are not discriminated against by automated computer systems.

2017-03-02

Warning: Fake Ransomware

When confronted with what appears to be a crypto-ransomware demand many UK businesses pay up too quickly.

2017-02-24

2016 Healthcare Data Breaches

The number of US companies admitting to suffering Data Breaches went up 40% in 2016. Healthcare organisations were among the most vulnerable.

2017-02-13

Cybersecurity In 2017: Recruitment Is The Key

Help Wanted: McAfee estimates that there will be two million unfilled job positions in the cybersecurity sector within the next two years.

2017-02-24

Stop Arguing On Social Media

Once considered a world of trivia, Social Media now has a very large and growing influence in Politics, Business and Society around the world.

2017-02-15

UK Fraud Hits £1.1bn As Cyber Crime Soars

A 55% year-on-year rise in the value of reported fraud to £1.1bn is a warning about increasing cyber-crime.

2017-02-28

A Hybrid AI System That Is x 3 Better Than Automated Systems

PatternEx are building an AI that works in combination with human analysts to build a cyber defense application that beats fully automated systems.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Juniper Networks

Juniper Networks

Juniper Networks is the industry leader in network innovation. We provide network infrastructure and network security solutions.

Detectify

Detectify

Detectify is a web security service that simulates automated hacker attacks on your website, detecting critical security issues before real hackers do.

Electus Recruitment Solutions

Electus Recruitment Solutions

Electus is a leading recruitment specialist in the Engineering, Technology & Digital and Cyber & Security sectors.

Averon

Averon

Averon's technology is the new gold standard for digital identity - the easiest, fastest and most secure verification solution for users on both WiFi and LTE.

Untangle

Untangle

Untangle provides network security products designed specifically for the below-enterprise market, safeguarding businesses, home offices, nonprofits, schools and governmental organizations.

Phew

Phew

Phew are New Zealand cyber security specialists with expertise and experience forged in global financial markets, IT&T, management consulting and SME business management.

Cyber Security Malta

Cyber Security Malta

Cyber Security Malta is part of Malta's National Cyber Security Strategy which aims to combat cybercrime, strengthen national cyber defence and provide cyber security awareness and education.

Havelsan

Havelsan

HAVELSAN is a leading technology company in Turkey developing indigenous systems for domestic and foreign military, public and private sector clients.

CMMI Institute

CMMI Institute

CMMI Institute enables organizations to elevate and benchmark performance across a range of critical business capabilities, including product development, data management and cybersecurity.

Infodas

Infodas

Infodas provides Cybersecurity and IT consulting / system integration services as well as a range of innovative Cybersecurity products to public sector and commercial clients.

iQuila

iQuila

iQuila is a virtual overlay network which runs on top of an existing network. It creates a secure software enabled layer 2 connection across the internet or any public or private cloud.

TAG Cyber

TAG Cyber

TAG Cyber's mission is to provide world-class cyber security research, advisory, and consulting services to enterprise security teams around the world.

Quantum Armor

Quantum Armor

Quantum Armor is a next-gen cyber security monitoring platform that allows you to continuously stay aware of your security posture, and proactively spot trends, vulnerabilities and potential attacks.

Lancera

Lancera

Lancera provides growth accelerating Software Development, Web Presence and Cybersecurity Solutions with a focus on customer happiness.

Blue Cloud Softech Solutions

Blue Cloud Softech Solutions

Blue Cloud Softech propels inspiring digital transformations. We provide AI products, cybersecurity, healthcare technology, and cloud solutions.

Bestman Solutions

Bestman Solutions

As a specialist cyber security practice, we believe that people are an organisation’s most valuable asset. Success depends on hiring the right people, and this is where we come in.