News

2016-10-21

Ecuador Cut WikiLeaks Assange's Internet Connection

Diplomatic Incident: Ecuador fears their London Embassy's unexpected guest is trying to interfere with the US Presidential election.

2016-10-19

Pentagon Creates New 5,000 Strong Cyber Force

Formation of the Pentagon's new Cyber Mission Force is a key step in improving the US’s ability to respond to hacks by overseas adversaries.

2016-10-19

Dealing With Insider Data Theft

To learn that your company's confidential data was stolen, not by a hacker, but by an employee, is a nightmare scenario nobody wants to face.

2016-10-19

Stolen NSA Hacking Tools For Sale In Bizarre Auction

The hackers who are auctioning off Cyber-weapons allegedly stolen from the NSA are growing annoyed and want cash.

2016-10-19

Overwhelming Cyber Attacks On Healthcare

Healthcare organisations struggle to manage the risks of massive data breaches, which are hard to detect & often take months to discover.

2016-10-20

Women Suspected To Attempt Next Terror Attack

After a string of arrests of radicalised women, Europe is preparing for the next IS inspired terror attacks to be carried out by female assassins.

2016-10-19

Cybersecurity Is Just A Lot Of Trouble For The General Public

Security Fatigue: It's National Cybersecurity Awareness Month in the US but a new study suggests that the general public are giving up.

2016-10-24

New Virus Attacks All Windows-Based Computers

A new type of malware capable of running on every version of MS Windows that can be detected by only two anti-virus engines.

2016-10-25

Chatbot To Teach You A Foreign Language

Écoutez et répétez après moi: Can a bot really be as good as a one-to-one tutor for learning foreign languages?

2016-10-24

Tanks To Have Remote-Control

Generic driverless technology that can work any vehicle with a steering wheel can be applied to armoured vehicles, including tanks.

2016-10-21

Cybersecurity Skills Gap in India

The shortage of trained cybersecurity professionals is a global challenge and India is no stranger to that situation.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

HDI

HDI

HDI is the worldwide professional association and certification body for the technical service and support industry.

Information Security Research Association (ISRA)

Information Security Research Association (ISRA)

ISRA is a non-profit organization focused on various aspects of Information Security including security research and cyber security awareness activities.

Trusted Knight

Trusted Knight

Trusted Knight is a leading provider of security software solutions focused on defeating newly developed malware and crimeware trojans.

CSO GmbH

CSO GmbH

CSO GmbH provide specialist consultancy services in the area of IT security.

Keyless Technologies

Keyless Technologies

Simple, secure, and interoperable authentication. Keyless offers unmatched security, privacy and usability, while reducing risk and infrastructure costs.

Soliton

Soliton

Soliton is a leading Japanese technology company and a pioneer in IT security solutions for protecting company resources and data from external IT security threats.

ShardSecure

ShardSecure

ShardSecure Microshard technology eliminates data sensitivity, providing security, privacy and compliance beyond encryption.

Ascent Cyber

Ascent Cyber

Ascent Cyber provide simple and stress-free solutions to protect your business and its customers from the worries and costs of cybercrime.

WhizHack Technologies

WhizHack Technologies

WhizHack's mission is to not only create a pipeline of cyber security products but also to empower people to sustainable innovation in securing digital assets of tomorrow.

Hubify

Hubify

Hubify is an experienced, service-driven technology company specialising in business connectivity across mobile, data, voice, cloud, & cyber security solutions.

NorthRow

NorthRow

NorthRow provides digital transformation compliance solutions to help businesses manage regulatory and financial crime risks.

Descope

Descope

Descope is a service that helps every developer build secure, frictionless authentication and user journeys for any application.

Mindsprint

Mindsprint

Mindsprint (formerly Olam Technology and Business Services - OTBS) are a leading edge technology and business services firm.

Exiger

Exiger

Exiger is revolutionizing the way corporations, government agencies and banks navigate risk and compliance in their third-parties, supply chains and customers.

Piiano

Piiano

Piiano offers developer-friendly privacy and security products. Reduce risk and protect your data by using our specialized security and privacy SaaS tools.

Technoware Solutions

Technoware Solutions

Technoware Solutions is a global company committed to helping entities navigate the digital waters of modernizing their system processes in an ever changing cybersecurity landscape.