News

2016-09-07

SWIFT Discloses More Bank Thefts

The global bank transfer system is scrambling to secure it's systems as new vulnerabilities and undetected thefts are discovered.

2016-09-08

The Hack That Could Swing The US Election

Stolen Data & Vulnerable Voting Machines: Might hackers have a material impact on the 2016 Presidential race?

2016-09-15

Cybercrime Isn't The Reason Why Cash Remains King

The "cashless" world has proven unreliable in several ways and technology is actually supporting cash in many instances.

2016-09-21

WiFi Can Spy On You

City dwellers spend nearly every moment of every day awash in Wi-Fi signals and they can be used to monitor people in surprisingly detailed ways.

2016-09-22

Cybersecurity in Aviation

It’s no secret that the rise of the Internet of Things (IoT) introduces a host of new cybersecurity challenges and vulnerabilities for aircraft.

2016-09-13

Facebook, Twitter and Google Are A 'recruiting platform for terrorism''

The Social Network: Facebook, Twitter & Google are deliberately failing to stop terrorists using their websites to promote terror say British MPs.

2016-09-08

Hedge Fund Robot Outsmarts Master

Using artificial intelligence to look for meaningful patterns in the world’s data, then using these insights to create investment strategies.

2016-09-16

French Submarine Builder Admits Data-Warfare Breach

French submarine maker DCNS recently claimed it was the victim of economic warfare after theft of highly detailed information on its Scorpene vessel.

2016-08-30

For Russian journalists fighting hacks is part of the job

When news emerged that Kremlin-linked hackers attempted to breach The NYT Moscow bureau, it probably didn't surprise many Russian journalists

2016-08-30

Russian Cyber Spies & Hackers Are The New Normal

Time to set cyber espionage 'norms' before more volatile nation-states follow suit, experts say.

2016-09-20

The Cyber War Winter Has Arrived

Is the world at the edge of a balancing act that is tipping toward the world’s first war fought online?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

iStorage

iStorage

iStorage is the leading global provider of PIN Activated, hardware encrypted, portable data storage solutions.

Mocana

Mocana

Mocana provides a software platform that allows you to develop, test and distribute more secure IoT devices and services.

General Dynamics Information Technology (GDIT)

General Dynamics Information Technology (GDIT)

General Dynamics IT delivers cyber security services to defend critical information and infrastructure.

PCI Compliance Guide

PCI Compliance Guide

The PCI Compliance Guide is one of the leading educational websites available focused exclusively on PCI compliance.

CTM360

CTM360

CTM360 is a unified external security platform offering 24x7x365 Cyber Threat Management for detecting and responding to cyber threats.

Threatspan

Threatspan

Threatspan is a cybersecurity firm helping shipping and maritime enterprises achieve and maintain nautical resilience in an age of increasing cyber threats.

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide.

CyberMDX

CyberMDX

CyberMDX delivers proactive security built for hospital devices. 360° visibility, insight, and protection for all connected hospital technologies.

Macquarie Telecom Group

Macquarie Telecom Group

Macquarie Telecom is Australia's datacentre, cloud, cyber security and telecom company for mid-large business and government customers.

Stronghold Cyber Security

Stronghold Cyber Security

Stronghold Cyber Security is a consulting company that specializes in NIST 800, the Cybersecurity Framework and the Cybersecurity Maturity Model Certification.

GM Sectec

GM Sectec

GM Sectec is the world's largest independent Cyber Defense and Fraud Prevention firm laser focused on payment security.

VinCSS

VinCSS

VinCSS Internet Security Services JSC is a leading organization working in the field of researching, developing, producing products as well as providing cyber security services.

Upstack

Upstack

UPSTACK - One partner, end-to-end expertise, helping develop the solutions you need – when you need them.

Parablu

Parablu

Parablu is a leading provider of data security and resiliency solutions for the digital enterprise.

FOSSA

FOSSA

FOSSA is a leading SBOM (software bill of materials) and software supply chain risk management platform.

PriorityZero

PriorityZero

PriorityZero is a European company focused on remote security assessments and consulting services that operates on a global scale.