News

2015-04-21

Human Rights Activists Want to Ban ‘Killer Robots’

There are serious moral and legal concerns surrounding fully autonomous weapons.

2015-04-20

JP Morgan Algorithm Identifies Rogue Employees

The Bank is rolling out a program to identify rogue employees before they go astray.

2015-04-17

Baltimore Police Use ‘Stingray’ Cellphone Surveillance

US Police deploy controversial 'Stingray' cellphone surveillance technology.

2015-04-16

INTERPOL Targets Cybercrime in Asia

Cybercrime is a game changer for law enforcement in Asia.

2015-04-21

How Syrian Electronic Army Hacked Email Accounts of Assad’s Opponents

The group of hackers aligned with Syrian President Bashar al-Assad have been busy.

2015-04-22

Russia's Cyber Attacks Grow More Brazen

Russia has ramped up cyber attacks against the United States to an unprecedented level.

2015-04-16

China’s Cyber Attacks on Governments and Corporates in Asia

The Chinese government is accused of being behind a newly discovered set of cyber attacks across Southeast Asia over the past ten years.

2015-04-22

NSA’s Plan to Snowden-Proof Data Using the Cloud

With NSA’s widespread adoption of cloud-based computing, the spy agency has made a big technology bet.

2015-04-22

The Internet Connected Car

By 2020 BI Intelligence estimates that 75% of cars shipped globally will be connected.

2015-04-21

Planes Without Pilots

The Centaur Optionally Piloted Aircraft can be operated unmanned or with pilots on board.

2015-04-22

Wi-Fi on Planes is Vulnerable to Inflight Hacking

Hackers on commercial flights could now bring down the plane they are on by using the on board Wi-Fi.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Hitachi Systems Security

Hitachi Systems Security

Hitachi Systems Security provides customized services for monitoring and protecting the most critical and sensitive IT assets in our clients’ infrastructures 24/7.

Ponemon Institute

Ponemon Institute

Ponemon Institute conducts independent research on data protection and emerging information technologies.

NeuroChain

NeuroChain

NeuroChain is an intelligent ecosystem that is more secure, more reliable and much faster than blockchain.

Tokio Marine HCC

Tokio Marine HCC

Tokio Marine HCC is a leading specialty insurance group with a Financial and Professional product line including Tech and Cyber.

Internet Crime Complaint Center (IC3)

Internet Crime Complaint Center (IC3)

The Internet Crime Complaint Center provide the public with a reporting mechanism to submit information to the FBI concerning suspected Internet-facilitated criminal activity.

Avalanchio Technologies

Avalanchio Technologies

The Avalanchio platform gives you a complete solution to collect, process, and analyze security data to detect threats in real-time and analyze historical data using security DSL or SQL.

WhizHack Technologies

WhizHack Technologies

WhizHack's mission is to not only create a pipeline of cyber security products but also to empower people to sustainable innovation in securing digital assets of tomorrow.

Ostra Cybersecurity

Ostra Cybersecurity

As a next-generation MSSP, Ostra Cybersecurity combines best-in-class tools, proprietary technology and exceptional talent to deliver Fortune 100-level protection for businesses of all sizes.

Unisys

Unisys

Unisys is a global information technology company providing industry-focused solutions integrated with leading-edge security to clients in the government, financial services and commercial markets.

iomart Group

iomart Group

iomart is a cloud computing and IT managed services business providing secure hybrid cloud, network connectivity, data management, and digital workplace capability.

LevelBlue

LevelBlue

LevelBlue simplify cybersecurity through award-winning managed security services, experienced strategic consulting, threat intelligence and renowned research.

iTRUSTXForce

iTRUSTXForce

iTRUSTXForce is a global provider of DigitalX (cybersecurity, privacy, and digital trust) services. We offer comprehensive services that focus on delivering outcomes for our clients.

Genix Cyber

Genix Cyber

Genix Cyber provides world-class cybersecurity services that protect systems, cloud applications, infrastructure, critical data, and networks from evolving cyber threats.

Bridgenet Solutions

Bridgenet Solutions

Bridgenet specialises as a top-notch Information and Technology Solutions Provider for businesses.

STACK Cybersecurity

STACK Cybersecurity

STACK Cybersecurity serves as a strategic partner, guiding you through the intricate and dynamic cybersecurity landscape.

Cyro Cyber

Cyro Cyber

Cyro Cyber is a collective of some of the UK’s most experienced and savvy cybersecurity, information assurance, data protection, IT governance and compliance experts.