News

2016-09-14

Mass Surveillance: Cuba Filters Text Messages

Cuba Libre: Mass surveillance mobile telecoms program based on key search terms like 'democracy' and 'human rights'.

2016-09-14

US Spy Agencies Will Analyse Insider-Threats

Sentimental: US spy agency plans to identify the people inside the organization most likely to abuse their access privileges by analysing text.

2016-09-12

Obama Warns Of Russian Cyber Warfare Threat

There is a risk of a 'Wild West' style escalating struggle between the US and other cyber-equipped powers.

2016-09-09

Does Russia Benefit When Assange Reveals Secrets?

Julian Assange and WikiLeaks are back in the spotlight, with new disclosures and a promise of more to come. But who really benefits?

2016-09-13

Yahoo Suspects It Has Suffered A Huge Data Breach

Yahoo is investigating claims the hacker has posted details of 200 million Yahoo accounts to a marketplace on the dark web.

2016-09-14

IBM’s Watson Takes Aim At CyberSecurity

IBM has launched a new cloud-based version of the company’s cognitive technology to tackle the rising challenge of cyber security.

2016-09-08

Hong Kong Hacked

Two Hong Hong government agencies have come under attack from cyber-spies originating in China.

2016-09-14

Cybercrime & Cyberwar: A Spotter's Guide

Cybercriminals are as varied as other Internet users: They have different tools, objectives & specialties. Understanding them can defend against them.

2016-09-10

Critical Infrastructure Is The Next Target

The way we think about cyber-attacks changed when Ukraine experienced the first recorded power outage caused by a cyber-attack.

2016-09-13

Canadian Companies Vulnerable To Cyber-Attacks

Canadian organizations aren’t prepared for the rising caliber of attacks, according to Deloitte’s 2015 cyber security survey.

2016-09-17

Australian Government Networks Hacked

Sensitive Australian Government and corporate computer networks have been penetrated by sophisticated cyber-attacks.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyren

Cyren

Cyren is a cloud-based, Internet security technology company providing threat detection and security analytics.

Global Secure Solutions (GSS)

Global Secure Solutions (GSS)

Global Secure Solutions is an IT security and risk consulting firm and authorised ISO training partner for the PECB.

National Cyber Security Centre (CNCS) - Portugal

National Cyber Security Centre (CNCS) - Portugal

CNCS is the operational coordinator and Portuguese national authority in cybersecurity working with State entities, and digital service providers

New Zealand Internet Task Force (NZITF)

New Zealand Internet Task Force (NZITF)

The New Zealand Internet Task Force (NZITF) is a non-profit with the mission of improving the cyber security posture of New Zealand.

SK IT Cyber Security

SK IT Cyber Security

SK IT provide services and solutions for cybersecurity and advanced information system engineering.

Veracity Industrial Networks

Veracity Industrial Networks

Veracity provides an innovative industrial network platform that improves the reliability, efficiency, and security of industrial networks and devices.

Option3

Option3

Option3 (formerly Option3Ventures - O3V) primarily seek control investments in the growing cybersecurity mid-market, seeking to build champions with the scale to bring cutting-edge products to market.

e360

e360

e360 (formerly Entisys360) is an award-winning IT consultancy specializing in advanced IT infrastructure, virtualization, security, automation and cloud first solutions.

Cyber Gate Defense (CyberGate)

Cyber Gate Defense (CyberGate)

CyberGate is an Emirati establishment founded with an objective to provide cyber security services that would improve the overarching cyber security posture of the UAE.

Charterhouse Voice & Data

Charterhouse Voice & Data

Charterhouse is your trusted technology partner - designing, provisioning and supporting the technology that underpins your operations including network security and data compliance.

Canopius Group

Canopius Group

Canopius is a global specialty lines insurance and reinsurance company and one of the top 10 insurers in the Lloyd’s insurance market.

Cardonet

Cardonet

Cardonet is an IT Support and IT Services business offering end-to-end IT services, 24x7 IT Support to IT Consultancy, Managed IT and Cyber Security.

Red Goat Cyber Security

Red Goat Cyber Security

Red Goat Cyber Security have created excellent, informative and interactive Social Engineering Awareness training which is suitable for all levels of staff.

SecureTeam

SecureTeam

SecureTeam are a UK-based information security practice, specialising in all areas of cybersecurity.

Cypherleak

Cypherleak

Cypherleak provide Automated Cyber Risk Monitoring & Ai powered cyber recommendations.

Syteca

Syteca

Syteca is specifically designed to secure organizations against threats caused by insiders. It provides full visibility and control over internal risks.