News

2016-07-27

Cyber-Attack Takes Down Pokémon Go

Hacking group going by the name of PoodleCorp has claimed responsibility for a massive DDoS attack which brought down Pokémon Go.

2016-07-27

The Future Of Big Data Science

Apache Spark: An open source tool is opening up big possibilities for Data Science

2016-07-28

Google Wants Your Medical Records

Google's DeepMind has moved on from playing Go to more serious matters - attempting to solve some of the world's biggest health problems.

2016-07-27

US Defense Intelligence Agency Is Researching Employee Social Media Histories

The Pentagon is researching a "social media checks" pilot scheme that would analyze public posts to help determine an employee's suitability.

2016-07-27

Ransomware: Should You Pay The Ransom?

Security professionals dread the day when they learn that ransomware has infiltrated their network and started encrypting files & drives.

2016-07-26

US Carmakers Want Hackers To Help Them Improve Cybesecurity

Today's automobile is rapidly becoming a computer on wheels, with more micro-processing power than can be found in a typical home or office.

2016-07-26

Snowden iPhone Case Alerts Users To Surveillance

Edward Snowden has helped design a mobile phone case that shows when a smartphone is transmitting information that could be monitored.

2016-07-26

US Cyber Mission Force Nearly Ready for Action

The new cyber force will eventually contain over 6000 operatives split into 133 groups, with both offensive and defensive missions.

2016-07-26

Cloud Video Architecture Improves Emergency Services Response

Visual data can be critical in knowing where to send emergency services personnel, tracking suspects, or detecting hazardous materials.

2016-07-25

Cybersecurity: The Human Dynamic

Ultimately, cyber security is governed by choices made by a human sat at a keyboard.

2016-07-25

Criminals Invent Clever New Way To Plant Banking Malware

Watering Hole Attack: Malicious executable bug contained inside a file that installed a legitimate administrative tool.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Axial

Axial

Axial Systems is one of the UK’s leading solution providers and systems integrators in network, security and services.

Cato Networks

Cato Networks

Cato connects your branch locations, physical and cloud datacenters, and mobile users into a secure and optimized global network in the cloud.

Atos

Atos

Atos provides a unique Cyber Security end to end solution with a data-centric and pre-emptive security approach.

Precise Biometrics

Precise Biometrics

Precise Biometrics develop and sell fingerprint software for convenient and secure authentication of people’s identity in mobile devices, smart cards and other products with fingerprint sensors.

Culinda

Culinda

Culinda secures medical IoT devices in hospitals with An Artificial Intelligence platform and security gateway.

Flipside

Flipside

Information Security training provider specialized in personalized training and security awareness campaigns.

Cybriant

Cybriant

Cybriant Strategic Security Services provide a framework for architecting, constructing, and maintaining a secure business with policy and performance alignment.

Pivot Point Security

Pivot Point Security

Pivot Point Security is a trusted leader in information security consulting. We help clients master their information security management systems.

Ostendio

Ostendio

Ostendio is a cybersecurity and information management solutions provider that develops affordable compliance solutions for digital health companies and other regulated entities.

TWC IT Solutions

TWC IT Solutions

Since 2011, TWC IT Solutions has offered managed IT Support, Cybersecurity, Disaster Recovery, Contact Centre and Business Connectivity services to clients across 24 countries globally.

Black Girls In Cyber (BGiC)

Black Girls In Cyber (BGiC)

Black Girls In Cyber's mission is to increase industry awareness and diversity in cybersecurity, privacy, and STEM for women of color.

Avalon Cyber

Avalon Cyber

Arm your organization in the fight against cyberattacks by partnering with the experts at Avalon Cyber.

Sycope

Sycope

Sycope is focused on designing and developing highly specialised IT solutions for monitoring and improving network and application performance.

Exacom

Exacom

Exacom is a leading provider of multimedia logging/recording solutions across public safety, government, DoD, energy, utilities, transportation, and security applications.

Mogwai Labs

Mogwai Labs

Mogwai Labs deliver cutting-edge penetration tests, security assessments and trainings, to safeguard your applications, networks and cloud environments from cyber threats.

AuthX

AuthX

AuthX provides secure and seamless log-in capabilities through strong authentication and integrations.