News

2017-03-14

Uber Wants Self-Flying Vertical Takeoff Cars

Elevate: Uber is making moves to expand the scope of its flying car experiment and has hired an expert from NASA to help with VTOL.

2017-03-20

Montreal’s Future In Smart Sensors And AI

Smart City: Montreal explores initiatives to leverage sensors, data collection & machine learning to deal with pressing municipal issues.

2017-02-14

Police Using IoT To Detect Crime

Just the Beginning: A local US Police force is trying to access the records of an Amazon Echo device as evidence in a murder investigation.

2017-02-20

Malware Traders Switch To Less Suspicious File Types

After aggressively using JavaScript email attachments to distribute malware, attackers are now switching to less suspicious file types.

2017-03-20

Does Russia’s Election Meddling Break International Law?

US spies say Russia interfered in the US elections. Cyber warfare experts aren’t sure if that constitutes coercion by one state against another.

2017-03-17

Data Realities: 2017 & Beyond

Data Matters: A critical driving force in the global economy will be data exploitation, data value creation, data-sharing & data protection.

2017-03-17

Google's New AI System Unscrambles Pixelated Faces

Google reveals a new AI system capable of “enhancing” an eight-pixel square image, increasing the resolution x 16-fold to restore lost data.

2017-02-28

Tech Companies Oppose Trump’s Travel Ban

SpaceX and Tesla are the latest to join the ranks of technology firms officially opposing the migrant ban imposed by the President Trump

2017-03-16

US Changes Policy On International Cyber Regime

US says a UN cybersecurity group should stop working on new rules for online behavior & focus on governments sticking to the ones we have.

2017-03-16

Teaching Kids Cyber Skills

In some Israeli schools gifted children take after-school classes in encryption tactics, coding and how to stop malicious hacking.

2017-03-15

Engaging with the National Cyber Security Strategy:

Public Policy Exchange Conference: Working in Partnership to Reduce Risk in the Digital Age - London May 23rd

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

European Cybercrime Training and Education Group (ECTEG)

European Cybercrime Training and Education Group (ECTEG)

The primary aim of ECTEG is to enhance the coordination of cybercrime training, by identifying opportunities to build the capacity of countries to combat cybercrime

Adroit Technologies

Adroit Technologies

Adroit Technologies has been developing award winning real-time software for the industrial automation markets for over 25 years.

VisionWare

VisionWare

VisionWare provide consulting services and solutions in areas covering both physical and digital security.

Destel

Destel

Destel is a system integrator and provider of IT services focused on Advanced Network & Security Solutions.

JM Search

JM Search

JM Search’s Information Technology Executives Practice sources the most sought-after technology roles including CIO, CTO, CISO, CDO and other senior posts.

ThreatReady Resources

ThreatReady Resources

ThreatReady reduces an organization’s risk by delivering cyber security awareness training based on the latest, state-of-the-art learning science to effectively drive long-term cyber-safe behavior.

Motiv ICT Security

Motiv ICT Security

Motiv is the ICT security specialist that provides public and private sector organisations with IT security solutions and services to prevent cybercrime, data theft and data breaches.

FortifyIQ

FortifyIQ

FortifyIQ's mission is to advance maximum security against side-channel attacks across the entire computing spectrum.

Vantage Point Security

Vantage Point Security

Vantage Point are specialists in penetration testing and application security with a focus on the industries undergoing rapid digital transformation.

Cloud Range

Cloud Range

Cloud Range provides cybersecurity teams with access to the world's leading cyber range platform, eliminating the need to invest in costly cyber range infrastructure.

Nanitor

Nanitor

Nanitor is a powerful cybersecurity management platform focusing on hardening security fundamentals across your global IT infrastructure.

Liquis Inc.

Liquis Inc.

Liquis, founded in 2002, is one of the largest facility decommissioning services companies in the U.S.

Leostream

Leostream

Leostream's Remote Desktop Access Platform enables seamless work-from-anywhere flexibility while maintaining security and constant visibility of users.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Tychon

Tychon

Tychon develops advanced enterprise endpoint management technology that enables commercial and government organizations to bridge the gap between security and IT operations.

Orca Tech

Orca Tech

Orca Tech brings together a portfolio of complimentary vendor in the IT security industry to help provide a complete solution to meet the requirements of our Partners across all sectors.

Ryan Financial Lines

Ryan Financial Lines

Ryan Financial Lines Cyber provides risk transfer solutions for complex cyber and technology exposures, globally.