News

2016-05-18

International Co-Operation: Challenges & Potential For Engaging In Cyberspace

International norms in cyber security are headed into a period of turbulence. Opinion by Jamie Collier

2016-05-17

Syrian Government Hacked

Mystery group named Cyber Justice Team hacked the Syrian National Agency for Network Services and dumped the stolen data.

2016-05-18

Ransomware Everywhere: What’s The Technology Behind It?

According to the FBI, US companies paid $25 million in ransom last year, and it expects the 2016 total to be more than $200 million.

2016-05-18

Hacking Team Postmortem

Hacking Team sells intrusion and surveillance tools to governments and law enforcement agencies. Nine months ago they were hacked.

2016-05-24

As Pentagon Dawdles, Silicon Valley Sells It’s Hottest Technology Abroad

Technolgy CEOs say red tape and onerous requirements are undermining just the sorts of products that the Pentagon says it wants.

2016-05-23

Could Bitcoin’s Blockchain Run An Entire City?

The smart city is not a pipe dream, but it is a big, intimidating problem. Blockchain technology could solve that.

2016-05-25

Cyber Insurance: Security Tool or Hype?

Cyber insurance fits into the broader context of a security strategy focused on risk mitigation

2016-05-25

Mobile Spying – What’s Possible, Ethical Or Useful?

Many widely used mobile apps have a legitimate feature - remote mobile monitoring. Is this any different from illegitimate spyware?

2016-05-20

Related Aspects Of A Breach: Impact Of Partners & Suppliers

Analysis of the giant breach at retailer Target shows that business partners and suppliers can spell big trouble for an organization’s security.

2016-05-20

Vulnerable Australia Boosts National Cyber Security

Australia introduces a multi-million-dollar national cybersecurity policy to combat hacking but stops short of blaming recent attacks on China.

2016-05-23

Healthcare Execs Credit IT With Improving Care

Healthcare managers say the cost savings and interoprability benefits of improved IT systems outweigh the security concerns.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Mitol PerfectBackup

Mitol PerfectBackup

Mitol PerfectBackup provide Enterprise Online Backup, Disaster Recovery and Cloud Computing Services.

ForgeRock

ForgeRock

ForgeRock, the leader in digital identity, delivers comprehensive Identity and Access Management solutions for consumers, employees and things to simply and safely access the connected world.

Beyond Security

Beyond Security

Beyond Security is a leader in automated vulnerability assessment and compliance solutions - enabling customers to accurately assess and manage security weaknesses in their networks and applications.

Conviso

Conviso

Conviso is a consulting company specialized in Application Security and Security Research.

Celerium

Celerium

Celerium transforms cyber defense for both companies and industry sectors by leveraging cyber threat intelligence to defend against cyber threats and attacks.

Littlefish

Littlefish

Littlefish provide world-class, award-winning Managed IT and Cyber Security Services, delivered from our 24/7 UK service centres.

IoTeX

IoTeX

Building the connected world. IoTeX is a fast, secure, and decentralized platform that connects real world devices/data to the blockchain.

Institute for Pervasive Cybersecurity - Boise State University

Institute for Pervasive Cybersecurity - Boise State University

Boise State University’s Institute for Pervasive Cybersecurity is a leader of innovative cybersecurity research and advancement in Idaho and the region.

Cloud Range

Cloud Range

Cloud Range provides cybersecurity teams with access to the world's leading cyber range platform, eliminating the need to invest in costly cyber range infrastructure.

Outsource Group

Outsource Group

Outsource Group is an award winning Cyber Security and IT Managed Services group working with a range of SME/Enterprise customers across the UK, Ireland and internationally.

Traceable

Traceable

Traceable was founded to protect applications from next-generation attacks.

Assured Clarity

Assured Clarity

Assured Clarity are a global consultancy, specialising in Risk Management and Data Privacy, through Education, Awareness and Training, throughout an organisation.

ActiveFence

ActiveFence

ActiveFence enables Trust & Safety teams to be proactive about online integrity so they can keep their users safe from online harm – across content formats, languages, and abuse areas.

Positka FSI Pte Ltd

Positka FSI Pte Ltd

Positka, being a Splunk Singapore partner, provides Splunk & Phantom Services, Cybersecurity & Risk Management, Analytics & Big Data, Lean Process Optimization, and Managed Security Services.

Silobreaker

Silobreaker

Silobreaker is a SaaS platform that enables threat intelligence teams to produce high-quality and relevant intelligence at a faster pace.

RAH Infotech

RAH Infotech

RAH Infotech is India’s leading value added distributor and solutions provider in the Network and Security domain. We are specialists in Enterprise and App Security and Application Delivery.