News

2016-08-24

For Sale: Leaked Terror Watch List

Stolen WorldCheck database containing a detailed list of suspected and convicted criminals & terrorists is reportedly being sold online $2,300.

2016-08-11

Top Tips To Protect Email Accounts From Hackers

Today email accounts have substituted one’s personal diary and could be described as an easy gateway to enter someone’s personal life.

2016-08-11

Tools & Training To ‘Hack Yourself’ To Security

How to teach your blue team to think like the red team when your network is under attack and time is your most valuable asset.

2016-08-11

DDoS Attacks Shuts Down Pro-ISIS Websites

Outraged hackers have combined forces to take down ISIS affiliated websites.

2016-08-11

Phineas Fisher Fingered: Hacking the Turkish Government

A notorious hacker has claimed responsibility for hacking Turkey’s ruling party, the AKP, stealing more than 300,000 internal emails and other files.

2016-08-11

Deep Mystery: Looking For MH370

Researchers hunting for the lost Malaysia Airlines MH370 now believe the plane glided down & they have been searching the wrong patch of ocean.

2016-08-11

‘Dropping Elephant’ Is A New Cyber Espionage Group

Kaspersky Lab is monitoring a new cyber espionage group which has a high success rate despite using only low tech attacks.

2016-08-11

The Race To Regulate Self-Driving Cars

Unintended consequences of the the “internet of things” include incomplete & inconsistent laws which depress the benefits without addressing the risks.

2016-08-10

ISIS Suspect Was Sending Encrypted Emails

A senior Indian intelligence official says that an ISIS suspect used tutanota.com, a secure email encryption app, to contact his foreign handler.

2016-08-15

Rio Olympics Hacking Threats

World-class athletes aren't the only ones preparing for the Olympic Games. World-class cybercriminals are also hoping to leave with gold.

2016-08-19

Google Uses AI To Save On It’s Energy Bills

Its artificial intelligence division, DeepMind, has cut Google's data centres' energy consumption by 15%, using a machine-learning algorithm.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XBOSoft

XBOSoft

XBOSoft is a software QA and testing company. We cover the entire QA and testing life cycle including software and application security.

Security Audit Systems

Security Audit Systems

Security Audit Systems is a website security specialist providing website security audits and managed web security services.

DataLocker

DataLocker

DataLocker offers both hardware based external storage and software based cloud storage encryption solutions.

Atomicorp

Atomicorp

Atomicorp, the leader in Secure Linux, is a developer of solutions for the protection and support of cloud, virtual, shared, and dedicated web hosting environments.

Cymulate

Cymulate

Cymulate is a SaaS-based breach and attack simulation platform that makes it simple to know and optimize your security posture any time, all the time.

Sensible Vision

Sensible Vision

SensibleVision helps organizations transparently protect data and prevent costly security breaches by constantly verifying the identities of people who use computers or mobile devices.

Redborder

Redborder

Redborder is an Open Source network visibility, data analytics, and cybersecurity Big Data solution that is scalable up to the needs of enterprise networks and service providers.

Liquid Technology

Liquid Technology

Liquid Technology provide DOD- and NIST-compliant data destruction and EPA-compliant e-waste disposal and recycling services throughout North America, Europe and Asia.

Absio

Absio

Absio provides the technology you need to build data security directly into your software by default, and the design and development services you need to make it happen.

Zerodium

Zerodium

Zerodium is the leading exploit acquisition platform for premium zero-days and advanced cybersecurity research.

UK Research & Innovation (UKRI)

UK Research & Innovation (UKRI)

UKRI works in partnership with universities, research organisations, businesses, charities, and government to create the best possible environment for research and innovation to flourish.

Privafy

Privafy

Privafy helps mobile service providers, IoT manufactures , and enterprises redefine the way they protect Data-in-Motion.

BreachQuest

BreachQuest

BreachQuest brings together cybersecurity experts with decades of experience identifying security flaws, penetrating networks, and responding to incidents.

Ankura Consulting Group

Ankura Consulting Group

Ankura is a global expert services and advisory firm that delivers services and end-to-end solutions in a wide range of areas including cybersecurity and digital transformation.

NewAE Technology

NewAE Technology

NewAE Technology is revolutionizing the hardware security market by making every engineer and designer aware of side-channel power analysis and glitching as important attack vectors.

Gorilla Technology Group

Gorilla Technology Group

Gorilla specializes in video analytics, OT network security and big data to support a wide range of solutions for commercial, industrial, cities and government purposes.