News

2017-01-16

Turkish Lender Akbank Under Attack

Missing: $44m vanishes after hackers target Turkish financial institution Akbank using the SWIFT money transfer system.

2017-01-05

Check If Your VPN Is Leaking Private Data

A virtual private network (VPN) is a great way to keep your Internet usage private & secure at home or on public Wi-Fi. If it's not leaking.

2017-01-09

Germany Wants To Order Social Media To Police Hate Speech

Germany is considering new laws to force social media platforms to take a more active role in policing illegal hate speech on their sites.

2017-01-13

UK Schools & Teaching Computer Science

A revolution is under way in the teaching of computer science in schools in England, but it risks leaving poorer pupils behind.

2016-12-22

Yahoo’s Latest Billion Breach!

The scale of a second Yahoo data breach is massive, but although the attack took place in 2013 it is only in December 2016 that Yahoo made this public, because even they did not know about it until November 2016!

2017-01-04

Smartwatch Technology For Police Forces

A new generation of smartwatches and apps are giving police forces a practical wearable option, offering versatility in a convenient lightweight form.

2016-12-31

Claims That Google's Search Algorithm Spread False Information

Dont Be Evil: Google’s search algorithm appears to be systematically promoting information that is either false or slanted.

2017-01-03

Cyber Deterrence: How To Curb Cyber Attacks

Deterrence focused on making potential adversaries think twice about an attack has worked for nuclear weapons. What about cyber weapons?

2017-01-03

Cybersecurity Trends In 2017

Ransomware, Cloud, IoT, Automation are all in flux. Here are a few of the forecast cybersecurity trends for 2017 to be aware of.

2016-12-29

Decent Broadband 'denied' To Millions

More than 1.4 million homes in the UK cannot get decent broadband, a report from telecoms regulator Ofcom reveals.

2016-12-27

We Are In A New Era Of Espionage

Hackers' interference in the US Presidential Election is one of the greatest examples of a successful espionage operation in history.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Hogan Lovells

Hogan Lovells

Hogan Lovells is an international business law firm with offices across Europe, Asia and the USA. Practice areas include Privacy & Cybersecurity.

Verint Systems

Verint Systems

Verint is a leader in Actionable Intelligence with a focus on customer engagement optimisation, security intelligence, fraud, risk and compliance.

SentryBay

SentryBay

SentryBay is a real-time data security company developing technology for PC, mobile, the cloud and IoT.

Georgia Cyber Center

Georgia Cyber Center

Georgia Cyber Center is dedicated to training the next generation of professionals through education and real-world practice while also supporting innovation in new technologies for online defenses.

Bavarian IT Security Cluster

Bavarian IT Security Cluster

The Bavarian IT Security Cluster works to build regional IT security competencies and increase the competitiveness and market opportunities of its member companies.

Abusix

Abusix

Abusix specializes in Internet security, network abuse handling, antispam and fraud prevention.

Havelsan

Havelsan

HAVELSAN is a leading technology company in Turkey developing indigenous systems for domestic and foreign military, public and private sector clients.

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide.

National Health Care Anti-Fraud Association (NHCAA)

National Health Care Anti-Fraud Association (NHCAA)

National Health Care Anti-Fraud Association is the leading national organization focused exclusively on the fight against health care fraud.

Smart Hive

Smart Hive

Smart Hive has created a platform that will allow organizations to share real-time, relevant and actionable threat intelligence among each other while maintaining confidentiality.

BugDazz

BugDazz

BugDazz pentest as a service (PTaaS) platform helps bringing in real-time results, detail coverage, & easy remediation workflows with compliance-ready reports.

Siege Technologies

Siege Technologies

Siege Technologies is a pioneer of multi-purpose cybersecurity products and services that enable customers to leverage both offensive and defensive technologies.

Hyperproof

Hyperproof

Hyperproof is a cloud-based compliance operations software. Launch new programs immediately, collect evidence automatically, and manage a compliance program intelligently.

Ward Solutions

Ward Solutions

Ward Solutions are an information security consultancy and managed services company. We help organisations protect their brand, people, assets, intellectual property and profits.

Trace3

Trace3

Trace3 is a pioneer in business transformation solutions, empowering organizations to keep pace with the rapid changes in IT innovations and maximize organizational health.

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions is a managed security service provider that humanizes cybersecurity managed services to the Small-to-Medium Business (SMB) and Small-to-Medium Enterprise (SME) sectors.