FREE TO VIEW


« Back to News

2015-04-28

United Airlines Bans Researcher After 'joke tweet'

United Airlines ban a security researcher from a flight after he tweeted that he might be able to hack the aircraft's systems.

2015-04-29

NY Bank Regulator: Third Party Vendors Are a Backdoor to Hackers

A bank’s cyber security is often only as good as the cyber security of its vendors.

2015-04-30

How Can You Survive Cyber Warfare?

How to navigate the Internet without exposing yourself to attack.

2015-04-29

Cyber War Can Be Real War

The device is your computer, and the means of delivery of untold mayhem is the Internet.

2015-04-29

The 2016 USA Election Cyberwar Has Begun

Cyber cleaners searching the Internet for information harmful to their clients’ candidates.

2015-04-29

Will Biometrics Take Over From Passwords?

People are fed up with battling to remember dozens of passwords.

2015-04-27

US Healthcare: Data Breaches Are Increasingly Common

Prevention is better (and much less costly) than cure.

2015-04-28

Cyber Insurance: An Ineffective Way of Dealing with Hacks?

Coverage does not make you any safer; it merely provides a cushion for when you inevitably fall.

2015-04-28

Can the United Nations Improve Cybersecurity?

Reaching a consensus on the need to talk more.

2015-04-27

Google Adds Real-Time Analysis to its Cloud Service

Google is betting that real-time processing is the future of big data analysis.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

RedTeam Security

RedTeam Security

RedTeam Security is a provider of Penetration Testing, Social Engineering, Red Teaming and Red Team Training services.

maCERT

maCERT

maCERT is the national Computer Emergency Response Team for Morocco.

Security University

Security University

Security University is a leading provider of Qualified Hands-On Cybersecurity Education, Information Assurance Training and Certifications for IT and Security Professionals.

CloudMask

CloudMask

CloudMask patent technology provides Dynamic Data Masking (DDM) that masks sensitive data, structured or non-structured, in real-time.

SecureMe2

SecureMe2

SecureMe2 ‘s mission is to make organizations more responsive to digital threats by deploying smart technology in a highly accessible way.

CyberSAFE Malaysia

CyberSAFE Malaysia

CyberSAFE Malaysia is an initiative to educate and enhance the awareness of the general public on the technological and social issues and risks facing internet users.

DataDome

DataDome

DataDome offers real-time AI protection against all OWASP automated threats, including credential stuffing, layer 7 DDoS attacks, SQL injection & intensive scraping.

Cryptika

Cryptika

Cryptika is a fully integrated IT security and managed services provider, specialized in Next-Generation Cyber Security Technologies.

Secure Technology Integration Group (STIGroup)

Secure Technology Integration Group (STIGroup)

Secure Technology Integration Group, Ltd. (STIGroup) is an innovative firm that provides CyberSecurity consulting, secure IT engineering, managed security services, and human capital solutions.

CyberEdBoard

CyberEdBoard

CyberEdBoard is a private, peer-to-peer education and networking community focused on cybersecurity, technology, business processes and risk management.

Porto Research, Technology & Innovation Center (PORTIC)

Porto Research, Technology & Innovation Center (PORTIC)

PORTIC brings together several research centers and groups from P.PORTO in a single space, forming a superstructure dedicated to research, technology transfer, innovation and entrepreneurship.

BridgingMinds Network

BridgingMinds Network

BridgingMinds Network is an industry leading best practices and IT security training provider in Singapore.

DeepFactor

DeepFactor

DeepFactor is the industry’s first Continuous Observability platform enabling Engineering and AppSec teams to find and triage RUNTIME security, privacy, and compliance risks in your applications.

Heron Technology

Heron Technology

Heron Technology are a technology solutions consultancy with core competencies in the areas of Cyber Security and Digital Aviation.

OneCollab

OneCollab

OneCollab, your unwavering ally in the dynamic landscape of IT services and cybersecurity.

Lansafe

Lansafe

Lansafe stands as a leading managed service provider in the UK, seamlessly integrating IT, Telecoms, Security, Electrical and Cyber Security solutions.