News

2016-11-28

New Business Protection From Cyber Attackers

Entrepreneurs can be so focused on business building & day-to-day operations that they forget to protect their most precious data.

2016-11-23

BlackNurse DDoS Attacks Are Small But Mighty.

BlackNurse is a revolutionary cyber-attack technology. Hackers only need a laptop and minimal data to perform a crippling DDoS attack.

2016-12-03

Four Amazing Cybersecurity Facts

The global cybersecurity market is growing in every way. In Value, in Risks, in Costs and in the level of internal & external Threat.

2016-11-21

Adult Friend Finder & Penthouse Hacked

Adult dating and pornography site company Friend Finder Networks has been hacked, exposing 412m private accounts.

2016-12-06

Why Science Couldn’t Predict a Trump Presidency

The unexpected result wasn’t a failure of science.

2016-11-21

Five major Russian Banks Attacked

At least five major banks in Russia have been hit with a series of cyberattacks made possible by a malicious botnet.

2016-12-07

Both Police & Business Must Deal With Cyber Extortion

Hospitals, government organizations and banks are all targets to ransomware, where critical data is held hostage. The challenge can be traumatic.

2016-12-05

Israel To Assist Nigeria With Cybersecurity

Israel has pledged to assist Nigeria in tackling cyber-crime and internal security through the use of modern technology.

2016-12-02

Cyber Security Market Is In A People-Power Crisis

The rising cybercrime threat has driven the demand for cybersecurity professionals through the roof.

2016-11-24

24 Cyber Criminals Arrested

Romanian police arrest 24 members of a card skimming and cloning operation and identify 47 other suspects.

2016-11-23

Tesco Could Have Been Facing £2bn Fine After The Bank Hack

Tesco Bank has refunded £2.5m to its customers but its parent company could have been facing a fine of £2bn under the EU GDP rules.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Actiphy

Actiphy

Actiphy provides a tried and proven backup and disaster recovery software solution to ensure business continuity at all times.

Secure Decisions

Secure Decisions

Secure Decisions focus on research and product development related to national security including information assurance, computer network defense, cyber security education, and application security.

Ubiq Security

Ubiq Security

Ubiq has developed a software solution that secures any type of data, on any device, anywhere, with nearly no impact to system performance or user experience.

ProtonMail

ProtonMail

ProtonMail is an easy to use secure email service with built-in end-to-end encryption and state of the art security features.

Security & Intelligence Agency (SOA) - Croatia

Security & Intelligence Agency (SOA) - Croatia

SOA is the Croatian security and intelligence service. Areas of activity include Cyber Security and Information Security.

WISeKey

WISeKey

WISeKey is a leading cybersecurity company currently deploying large scale digital identity ecosystems for people and objects using Blockchain, AI and IoT.

Ordr

Ordr

Ordr Systems Control Engine. The first actionable AI-based systems control engine for the hyper-connected enterprise. You’re in control.

NeuroChain

NeuroChain

NeuroChain is an intelligent ecosystem that is more secure, more reliable and much faster than blockchain.

Threat Status

Threat Status

Threat Status are a Threat Intelligence company. We are the developers of Trillion. A cloud based Security As A Service (SaaS) platform.

Beyond Identity

Beyond Identity

Beyond Identity employs an elegantly simple concept, the personal certificate authority and self signed certificates, to replace passwords.

Chainlink

Chainlink

Chainlink expands the capability of smart contracts by enabling access to real-world data and systems without sacrificing the security and reliability guarantees inherent to blockchain technology.

CYDEF

CYDEF

CYDEF provides comprehensive, state-of-the-art cybersecurity protection that is accessible and affordable to organizations of any size.

Mage Data

Mage Data

Mage (formerly Mentis Software) is a leading solutions provider for data security and data privacy software for global enterprises.

RiskSmart

RiskSmart

RiskSmart empower risk, compliance, and legal teams with a tech-led and data-driven platform designed to save time, reduce costs and add real value to businesses.

Cyberplc

Cyberplc

Cyberplc is a global cybersecurity consulting firm providing services to government, the public sector and enterprises.

ExchangeDefender

ExchangeDefender

ExchangeDefender provides cybersecurity services that secures your company email and data, and guarantees 24/7 email access.