News

2016-08-30

High Resolution Cameras to Iraq

Iraq is to acquire the ScanEagle drone surveillance system to help suppress Islamic State.

2016-09-08

The 3 Biggest Mistakes in Cybersecurity

Don't risk losing the cyber war by avoiding these three critical mistakes.

2016-09-13

After A $65m Hack, Is Bitcoin Really Safe & Secure?

It seemed bitcoin exchange Bitfinex was doing all the right things. But, that didn’t stop hackers from stealing $65 million.

2016-09-13

Snowden: NSA Hacking Tools Leak Is ‘a warning’

From safety in Moscow and with a new film coming out, Edward Snowden opines on the NSA Equation Group hack.

2016-09-12

New Self-Driving Cars On The Market In 2019

MobileEye and Delphi are cooperating to offer vehicle manufacturers an end-to-end technology platform to make mass-market driverless cars.

2016-09-12

China Puts Quantum Encryption Into Orbit

A new satellite designed to establish ultra-secure quantum communications by transmitting uncrackable keys from space.

2016-09-12

Iraqi Military Invent A Unique Robot To Fight ISIS

Iraqi army is innovating as it deploys new weapons to drive out ISIS from occupied areas.

2016-09-12

Protecting Vehicles From Cyber- Attack

Cars and trucks with GPS, Bluetooth, and internet connections are clearly vulnerable to cyber attacks.

2016-09-12

Leak Spotlights NSA's Conflicting Missions

As well as spying overseas, the NSA has a lesser-known but growing role of helping to protect the US government's sensitive data.

2016-09-08

The Evolution of Hacking

The word “hacker” carries an overwhelmingly negative connotation, conjuring up images of digital thieves. It wasn’t always that way.

2016-09-08

UK Army Goes High-Tech With Future Drones

The British military is planning to invest over $1 billion in speculative technologies including insect-sized drones, laser firearms, & VR goggles.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Encode

Encode

Encode delivers a cutting edge Security Analytics & Response Orchestration platform and best of breed Cyber Security Operations and Services.

CommuniTake

CommuniTake

CommuniTake builds security, enablement, and management solutions to provide people and organizations with better, and more secure mobile device use.

Parsons

Parsons

Parsons has developed a converged security offering that combines cybersecurity, integrated network solutions, and critical infrastructure protection.

Sphonic

Sphonic

Sphonic provides regulated institutions of any size a powerful compliance & risk platform to quickly and securely onboard new customers and manage ongoing AML and Fraud & Risk trends.

u-blox

u-blox

u-blox deliver leading wireless technology to reliably and securely locate and connect people and devices.

Cyber Intelligence 4U

Cyber Intelligence 4U

Cyber Intelligence 4U is an educational services company that provides two levels of cybersecurity training programs: executive and technical.

TierPoint

TierPoint

TierPoint delivers secure, reliable, and connected infrastructure solutions at the internet’s edge. We meet you where you are in your journey to solve for data storage, compute, and recovery.

Spin Technology

Spin Technology

SpinOne is a SaaS data protection platform designed to monitor, secure, and back up your G Suite and O365 data, improve compliance, and reduce IT costs.

DeNexus

DeNexus

DeNexus is the leading provider of cyber risk modeling for industrial networks. Our Mission is to build the Global Standard for Industrial Cyber Risk Quantification.

ClearVector

ClearVector

ClearVector is a leading provider of realtime, identity-driven security for the cloud.

FoxTech

FoxTech

FoxTech is an independent, friendly and deeply specialised cyber security company in the UK, with expertise spanning decades of Public Sector and Government services.

ShellBoxes

ShellBoxes

ShellBoxes are a leading Web3 company focused on providing top-notch blockchain security and development services.

Whitaker Brothers

Whitaker Brothers

Whitaker Brothers data destruction equipment can be found in 115 countries and every single continent in the world, from major military organizations to small offices.

AUCloud

AUCloud

AUCloud is a leading Australian cyber security and secure cloud provider, specialising in supporting businesses and Governments with the latest cloud infrastructure.

VT Group (VTG)

VT Group (VTG)

VTG delivers force modernization and digital transformation solutions that expand America’s competitive advantage in the modern battlespace.

Windstream

Windstream

Windstream is a leading provider of advanced network communications and technology solutions for consumers, small businesses, enterprise organizations and carrier partners across the US.