News

2016-09-20

FBI: Don’t Pay Bitcoin Ransomware

The FBI has reversed its advice on paying ransomware. The agency now says people should refuse to pay bitcoin extortionists.

2016-09-20

Cloud-Based Malware Now Delivers Ransomware

Concerns over ransomware are growing and a new study finds that nearly half of all cloud-based malware now delivers ransomware applications.

2016-09-20

UK To Examine Phone Surveillance In Prisons

Its surprising that surveillance and tracking of mobile phone users in UK prisons has not been adopted earlier.

2016-09-19

Oliver Stone’s Snowden Film

Off The Grid: Making the film 'Snowden' had a chilling effect on the Directors own use of social media and the Internet.

2016-09-19

US Is Not Drawing 'Red Lines' in Cyberspace

The US government is avoiding drawing "red lines" in cyberspace to maintain strategic ambiguity about its intentions.

2016-09-19

Uber Starts Self Driving Taxis

Uber users will get a surprise the next time they request a pickup: the option to ride in a self-driving car.

2016-09-18

Will NSA & CyberCom Split?

The NSA's primary mission to spy on friends and enemies abroad is in conflict with the secondary task of defending US Government agencies at home.

2016-09-16

Delete Google Maps But They'll Still Track You

Google, it seems, is very, very interested in knowing where you are at all times.

2016-09-15

GCHQ To Create A UK National Firewall

The UK’s surveillance agency GCHQ is planning to create a British firewall offering national protection against malicious hackers.

2016-09-15

Artificial Intelligence & The Future Of Cybersecurity

AI can be used to detect threats, including those that are yet to be discovered, by identifying shared characteristics within families of threats.

2016-09-16

The White House Has Four Keys To Improving Cybersecurity

Never Too Late: The US Government has a plan to to improve cybersecurity across the board.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

SureCloud

SureCloud

SureCloud is a Governance, Risk and Compliance (GRC) and Cybersecurity Solutions provider.

ManagedMethods

ManagedMethods

ManageMethods Cloud Access Monitor is the only Cloud Access Security Broker (CASB) that can be deployed in minutes, with no special training, and with no impact on users or networks.

BioCatch

BioCatch

BioCatch uses behavioral biometrics for fraud prevention and detection. Continuous authentication for web and mobile applications to prevent new account fraud.

Neoteric Networks

Neoteric Networks

We deliver a no nonsense procedure to implementing technology. The technology selection process ensures that all customers enjoy an engineered methodology implementing technology.

Sera-Brynn

Sera-Brynn

Sera-Brynn is one of the highest-ranked, pure-play cybersecurity compliance and advisory firms in the world.

Inter-American Cooperation Portal on Cyber-Crime

Inter-American Cooperation Portal on Cyber-Crime

The Inter-American Cooperation Portal on Cyber-Crime was created to facilitate and streamline cooperation and information exchange among government experts from OAS member states.

Tutamantic

Tutamantic

Tutamantic develops software that reduces security risks and weaknesses during the architectural and design stages.

Ensurity Technologies

Ensurity Technologies

Ensurity is a deep-tech cybersecurity engineering company; designs and manufactures specialized secure hardware, software, and mobile application solutions.

Vivitec

Vivitec

Vivitec security services are tailored for your business, industry, risk, technology, and size to ensure great protection and planned response for the inevitable cyber-attacks on your business.

Corsha

Corsha

Corsha is on a mission to simplify API security and allow enterprises to embrace modernization, complex deployments, and hybrid environments with confidence.

SpecterOps

SpecterOps

SpecterOps has unique insight into the cyber adversary mindset and brings the highest caliber, most experienced resources to assess your organizations defenses.

StoneLock

StoneLock

StoneLock is a trusted leader in the design and manufacture of facial recognition software and technology.

MalwareFox

MalwareFox

MalwareFox is an advanced, yet simple-to-use anti-malware solution for Windows computers. We provide aggressive detection capabilities and an effective malware removal tool to keep your systems safe.

Nigerian Communications Commission (NCC)

Nigerian Communications Commission (NCC)

NCC has established a CSIRT for the telecommunication industry to provide services and support for the prevention and management of potential cyber security related emergencies.

Descope

Descope

Descope is a service that helps every developer build secure, frictionless authentication and user journeys for any application.

NetRise

NetRise

NetRise was founded as a direct result of the many shortcomings currently in the device security market, specifically targeting the firmware of devices.