News

2015-09-02

Hack on United Airlines Makes CIA's Job More Difficult

Stolen medical and financial records, may now include US intelligence officials’ travel itineraries from the world’s second-largest airline.

2015-09-02

Cyber Attack on US Power Grid Will Cost $1 Trillion

Thirty two percent of U.S emergency responses to cyber security threats occurred in the energy sector.

2015-09-01

Black Hat Budgeting: What would you do with US$1 million?

A thought Experiment by Richard Bejtlich of Tao Security

2015-09-01

Psychologists Work for GCHQ Deception Unit

Should psychologists should offer their expertise to spy agencies engaged in deception & propaganda?

2015-08-31

Biometric Security: From A Selfie To the Way You Walk

The mobile, cloud, banking & payments industries must prepare for the shift from traditional authentication to new biometric systems.

2015-08-31

Hacking For Cause: Growing Cyber Security Trend

What is the hacker motive if not for financial gain and is there is an evolving definition of right and wrong regarding hacking?

2015-08-31

Darkhotel Deploys Zero-Day From Hacking Team

Darkhotel: Latest research shows how the spy crew continues to evolve its cyber espionage methods.

2015-08-28

Seamless Technology Is a Gift for Cybercriminals

With cybercrime estimated to costs businesses more than $2tn by 2019, Marc Goodman says design is our best defence.

2015-08-28

Cyber Hackers Can Now Remotely Shoot Someone Else’s Sniper Rifle

American Sniper? A cyber hack that can disable the weapon from a distance, or at least manipulate it into not working properly.

2015-08-28

China Calls US a 'Cyber Bully' After False Accusation

Think Twice: Retaliation against China for the giant OPM Hack could be a big mistake.

2015-08-27

A Drone That Hacks Computers

Aerial Assault: A quadcopter flying hacker that scans the world below for insecure devices and vulnerable WiFi ports.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

StormWall

StormWall

StormWall is an Anti-DDoS protection service for websites and networks. We offer 100% protection from all types of DDoS attacks and 24/7 technical support.

Inter-American Cooperation Portal on Cyber-Crime

Inter-American Cooperation Portal on Cyber-Crime

The Inter-American Cooperation Portal on Cyber-Crime was created to facilitate and streamline cooperation and information exchange among government experts from OAS member states.

CIRISK

CIRISK

CIRISK offers a wide range of services from consulting to audit or project management to help you develop your cyber security or information security strategy.

IEEE Cyber Science and Technology Congress (CyberSciTech)

IEEE Cyber Science and Technology Congress (CyberSciTech)

CyberSciTech provides a platform for scientists, researchers, and engineers to share their latest ideas and advances in the broad scope of cyber-related science, technology, and application topics.

IntaPeople

IntaPeople

IntaPeople are IT and engineering recruitment specialists. We have specialist teams for job sectors including Cybersecurity, IT infrastructure and DevOps.

PQShield

PQShield

PQShield are specialists in Post-Quantum Cryptography. We provide quantum-secure cryptographic solutions for software, software/hardware co-design and data in transit.

DeepView

DeepView

DeepView delivers a unified platform for managing risk on digital platforms. One interactive secure portal allowing employees to engage their networks securely and compliantly.

Quantum Armor

Quantum Armor

Quantum Armor is a next-gen cyber security monitoring platform that allows you to continuously stay aware of your security posture, and proactively spot trends, vulnerabilities and potential attacks.

InfoSystems Inc

InfoSystems Inc

InfoSystems provides reliable IT solutions to build and maintain strong and secure systems for both SMB and enterprise organizations.

Commonwealth Cyber Initiative (CCI)

Commonwealth Cyber Initiative (CCI)

The Commonwealth Cyber Initiative is establishing Virginia as a global center of excellence at the intersection of security, autonomous systems, and data.

Finnish Security & Intelligence Service (SUPO)

Finnish Security & Intelligence Service (SUPO)

The Finnish Security and Intelligence Service is a government agency tasked with combating serious threats to national security in Finland.

ITConnexion

ITConnexion

From cloud migration to ransomware protection, our managed IT services can be customised to address the most prevalent IT issues for your business.

ITC Federal

ITC Federal

ITC Federal delivers IT cybersecurity assessment services to support agencies in meeting their security strategies and federal security compliance goals.

EPIQ Infotech

EPIQ Infotech

EPIQ Infotech is a trusted consulting and implementation partner for Oracle JD Edwards and Amazon Web Services (AWS).

Cakewalk

Cakewalk

Cakewalk is the new standard in easy Access Control. Trusted by IT & Security teams. Loved by employees.

Atlas Systems

Atlas Systems

Atlas Systems helps companies large and small accelerate their digital transformation journeys – expanding their capabilities and delivering tailored solutions including cybersecurity.