News

2016-12-21

Online Con Tricks Senior Executives Out of Millions

‘Whaling’, a form of spear phishing, sees high-net-worth individuals tricked into authorising online payments to cyber scammers posing as employees.

2016-12-21

No Password Is Too Complex For Hackers

Another huge data breach and another reason that the current password security system for business applications and websites is flawed.

2016-12-21

What Happened To The Blockchain Revolution?

The Financial Services industry is struggling to incorporate Blockchain technology as a standard for post-trade processing.

2016-12-21

NSA Eavesdrops On In-flight Mobile Calls

Thieving Magpie: The NSA and GCHQ have a joint surveillance program dedicated to intercepting targets in-flight by tracking their mobiles.

2016-12-21

Making Sense Of Cyber Insurance

The Dark Web. A sequence of huge Data Breaches. Ransomware. Virtual Currency. How do insurers & their customers make sense of Cybersecurity?

2016-12-20

Tackling Cybercrime: Time For The Regional Gulf Cooperation Council To Join Global Efforts

Gulf countries need to share information, intelligence & lessons learned in order to find the best ways to curb cybercrime. Opinion by Joyce Hakmeh

2016-12-20

Amazon Makes First Successful UK Drone Delivery

Autonomous aerial delivery could be a viable business sooner than thought. For customers with huge gardens, living close to the depot.

2016-12-20

Insurers Are Handling 'hundreds' Of Breach Claims

Business Is Booming: Leading London insurance firm says claims for data breaches are being made at a rate of more than one a day.

2016-12-20

Destructive Cyber Attack On Saudi Kingdom

'State sponsored hackers' have been disrupting air travel and other critical infrastructure in Saudi Arabia. Who is to blame?

2016-12-20

Yahoo Hack Affects 1 Billion Accounts

Yahoo says data from more than one billion accounts may have been hacked. No, not the last big one. There was another one before that....

2016-12-19

Obama Orders ‘Deep Dive’ Into Election Hacking

The White House has requested the Office of the Director of National Intelligence to make a full review of intereference in the US elections.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Booz Allen Hamilton

Booz Allen Hamilton

Booz Allen Hamilton is a management & tech consulting firm. Technology services include cloud computing, cyber security, systems development and integration.

Markel International

Markel International

Markel International is an international insurance company which looks after the commercial insurance needs of businesses. Specialist services include Cyber Risk insurance.

Holm Security

Holm Security

Holm Security are taking vulnerability assessment into the next generation as a cloud service.

BGD E-GOV CIRT

BGD E-GOV CIRT

BGD e-GOV CIRT's mission is to support government efforts to develop ICT programs by establishing incident management capabilities within Bangladesh.

Coro Cybersecurity

Coro Cybersecurity

Coro (formerly Coronet) empowers organizations to protect against malware, ransomware, phishing, and botnets - across devices, users, and cloud applications.

Quadible

Quadible

Quadible BehavAuth is an AI-platform that continuously authenticates the users, without the need of any input, by learning their behavioural patterns.

Sopher Networks

Sopher Networks

Sopher is a secure communication and collaboration platform for business and personal use.

Quzara

Quzara

Quzara provides trusted advisory services and highly adaptive cybersecurity services to federal, commercial and Defense Industrial Base customers to meet their security compliance and cyber needs.

Catalogic Software

Catalogic Software

Catalogic helps clients backup, recover, manage, and protect their data across their enterprise and cloud environments with Smart Data Protection solutions.

National Coordinator for Security and Counterterrorism (NCTV) - Netherlands

National Coordinator for Security and Counterterrorism (NCTV) - Netherlands

The NCTV serves the Netherlands’ national security. We protect national interests, identify threats and strengthen resilience.

Fulcrum Technology Solutions

Fulcrum Technology Solutions

The Fulcrum team of technologists are recognized experts in the fields of IT Infrastructure Technology, Security, Service Management and Support.

Sec3

Sec3

Sec3 is a security and research firm providing bespoke audits and cutting edge tools to Web3 projects.

Google Safety Engineering Center (GSEC)

Google Safety Engineering Center (GSEC)

GSEC Málaga is an international cybersecurity hub where Google experts work to understand the cyber threat landscape and to create tools that keep users around the world safer online.

DerSecur

DerSecur

DerSecur has been engaged in advanced technology activities in the field of Application Security since 2011. We offer R&D technology solutions in the field of SAST, DAST and SCA analysis.

Technoware Solutions

Technoware Solutions

Technoware Solutions is a global company committed to helping entities navigate the digital waters of modernizing their system processes in an ever changing cybersecurity landscape.

Permiso Security

Permiso Security

Permiso combines industry leading Identity Security Posture Management with Identity Threat Detection and Response, leaving no place to hide for identity threats lurking in your environment.