FREE TO VIEW


« Back to News

2017-08-18

Online Credit Card Fraud In Australia Surges

Last year criminals stole A$534 million as fraudsters keep pace with Australian consumers moving online.

2017-08-17

Cloud Portability Is Still Science Fiction

Enterprises want cloud portability, but the amount of work and money needed effectively prohibit them from moving in that direction.

2017-08-16

Nazi Website Taken Over By Anonymous

Hacker collective Anonymous have taken over a notorious Nazi website, following clashes in the US between protesters and white nationalists.

2017-08-16

Can US Cyber Weapons Stop N. Korea’s Nuclear Missiles?

Is it possible for the US to simply flick a switch and shut down the North Korean nuclear programme from 11,000km away?

2017-08-16

Learning About ISIS Intentions Using Open Source Intelligence

In Plain Sight: ISIS is encouraging its operatives & supporters around the globe to carry out attacks in their own countries. By Vasco Da Cruz Amador

2017-08-16

Interpol/Group-IB Unmasking Pro-ISIS Hackers

Interpol has teamed up with Russian security firm Group-IB in an effort to identify the members of a pro-ISIS hacker group.

2017-08-17

Using AI In Business Intelligence

Enterprise is entering a new era ruled by data. AI in business intelligence is evolving into many aspects of everyday business.

2017-08-16

German Police To Hack Suspect Devices

Forget About Backdoors: Police forces in Germany will be allowed to hack any suspected mobile device using interception software.

2017-08-14

Who Are The Shadow Brokers?

The indications point to intelligence insiders who are either current or former US intelligence community contractors.

2017-08-14

The US Power Generation System Is Under Siege

A remote substation working through a control system not connected via the Internet has less security than a power plant & is often an entry point.

2017-08-15

Singapore’s Mounting Cyber Threats

With mounting regional tensions the Singpore government is stepping up meaures to protect itself from cyber attacks.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Ionic Security

Ionic Security

Ionic provide a high-assurance data protection and control platform built on strong encryption, fine-grain control and contextual analytics.

KZ-CERT

KZ-CERT

KZ-CERT is the national Computer Emergency Response Team for Kazakhstan.

Guy Carpenter

Guy Carpenter

Guy Carpenter delivers a powerful combination of broking expertise, strategic advisory services, and industry-leading analytics.

Blue Ridge Networks

Blue Ridge Networks

Blue Ridge offers a suite of solutions that enable secure remote access to the enterprise network with protection and control of endpoints.

Norton

Norton

NortonLifeLock is dedicated to helping secure the devices, identities, online privacy, and home and family needs of approximately 50 million consumers.

Secure Decisions

Secure Decisions

Secure Decisions focus on research and product development related to national security including information assurance, computer network defense, cyber security education, and application security.

VNT Software

VNT Software

VNT's vision is to change the way complex IT problems are resolved by predicting business disruptions before they occur.

Tessian

Tessian

Tessian (formerly CheckRecipient) is a next-generation email security platform that helps enterprises counteract human error and significantly reduce the risk of data loss.

InstaSafe Technologies

InstaSafe Technologies

InstaSafe®, a Software Defined Perimeter based (SDP) one-stop Secure Access Solution for On-Premise and Cloud Applications.

UST

UST

UST is a global provider of digital technology and transformation, IT services and solutions including managed security services.

Altospam

Altospam

Altospam is a full service corporate email protection, integrating multiple security levels for your emails.

Upstack

Upstack

UPSTACK - One partner, end-to-end expertise, helping develop the solutions you need – when you need them.

Apura Cybersecurity Intelligence

Apura Cybersecurity Intelligence

Apura is a Brazilian company that develops advanced products and provides specialized services in information security and cyber defense.

Anatomy IT

Anatomy IT

Anatomy IT empowers healthcare providers to deliver exceptional patient care with cutting-edge technology and cybersecurity solutions.

FastPassCorp

FastPassCorp

In the world of IT, identity theft is a growing concern. FastPass offers an innovative solution as a cloud or on-premises offering.

SECTA5

SECTA5

SECTA5 is a cybersecurity company building a next-generation Continuous Threat and Exposure Management platform, leveraging the expertise of offensively trained cyber defenders.