News

2016-10-26

British Military Is Using Cyber Warfare Against Islamic State

The UK admits using cyber warfare techniques in the fight against Islamic State for control of the Iraqi city of Mosul.

2016-10-26

US Intelligence Has The Evidence That Proves Russian Presidential Election Interference

Donald Trump says Hillary Clinton has 'no idea' if Russian hackers are interfering in the US Elections, but James Clapper does.

2016-10-26

US Banks Face New Demands To Protect Themselves From Hackers

The US Federal Reserve and other US regulators decide to force the biggest financial institutions to plug vulnerabilities against hackers.

2016-10-27

Valuable Security Assets Are Human, Not Technical

The biggest threat to healthcare IT security is the human element. But if human beings are the problem that also makes them the largest asset.

2016-10-25

Russian Citizen Charged With Hacking LinkedIn

A Russian man has been charged with stealing information from computers at LinkedIn and other San Francisco Bay Area companies.

2016-10-26

All Tesla’s Cars Will Have Full Self-Drive

Tesla has announced that all US Tesla cars made from now on will have all the hardware they need on board to achieve full self-driving.

2016-10-26

Media Vulnerable To Election Night Cyber-Attack

US media organisations have failed to properly protect their newsrooms which are vulnerable to a chaos-creating hack around Election Day.

2016-10-25

Hackers 'weaponised' Malware To Mount Massive Assault

The huge weekend attack on global Internet access is believed to have been unleashed by hackers using common IoT devices.

2016-10-25

FBI Using Big Data To Predict Terrorism

Recent terrorist attacks have quickened the pace for US Law enforcement to use predictive analyitcs and big data mining techniques.

2016-10-24

Artificial Intelligence Will Be A Critical Economic Driver

AI is an increasingly critical technology that can fight cyberattacks, upgrade weapons of war, improve health care & transport systems.

2016-10-21

Ecuador Cut WikiLeaks Assange's Internet Connection

Diplomatic Incident: Ecuador fears their London Embassy's unexpected guest is trying to interfere with the US Presidential election.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Open Networking Foundation (ONF)

Open Networking Foundation (ONF)

The Open Networking Foundation (ONF) is a non-profit operator led consortium driving transformation of network infrastructure and carrier business models.

Jumpsec

Jumpsec

Jumpsec provides penetration testing, security assessments, social engineering testing, cyber incident response, training and consultancy services.

Cyber 2.0

Cyber 2.0

Cyber 2.0 is the only system in the world that blocks all forms of cyber attack within the organization, including new and unfamiliar attack methods.

Cybersecurity Advisors Network (CyAN)

Cybersecurity Advisors Network (CyAN)

CyAN provides a not-for-profit platform that helps private and public organisations as well as governments to identify trusted advisors in the area of Cyber Security and Cyber Crime.

ThreatAdvice

ThreatAdvice

ThreatAdvice is a provider of cybersecurity education, awareness and threat intelligence.

Herbert Smith Freehills

Herbert Smith Freehills

Herbert Smith Freehills is a leading professional services including data protection and privacy.

ShieldIOT

ShieldIOT

ShieldIOT delivers a complete AI-powered security solution across any IoT device, application and network.

Cybersecurity Coalition

Cybersecurity Coalition

The mission of the Cybersecurity Coalition is to bring together leading companies to help policymakers develop consensus-driven policy solutions to achieve improvements in cybersecurity.

YouWipe

YouWipe

Scandinavian Data Erasure Leader YouWipe is the number one choice of European Ministries, European Central Banks, Swiss Pharmaceuticals and Major Electronics Retail Chains.

Wontok

Wontok

Wontok deliver innovative value-added data security services that fill the gaps left in traditional security solutions.

SHIELD

SHIELD

SHIELD are the world’s leading cybersecurity company specializing in cyber fraud and identity solutions.

Pentest Limited

Pentest Limited

Pentest Limited provide information security consultation, penetration testing & red teaming services to companies across the globe.

Client Solution Architects (CSA)

Client Solution Architects (CSA)

Client Solution Architects (CSA) is a leading digital transformation consulting firm focused on the U.S. Defense Department and all U.S. Federal enterprise information technology service areas.

BlockAPT

BlockAPT

BlockAPT, empowering you with an advanced, intelligent cyber defence platform. We protect our customers digital assets by unifying operational technologies against advanced persistent threats.

Ipstack

Ipstack

Ipstack offers one of the leading IP to geolocation APIs and global IP database services worldwide. Protect your site and web application by detecting proxies, crawlers or tor users at first glance.

Buchanan Technologies

Buchanan Technologies

Buchanan Technologies is a leading IT consulting and outsourcing services firm. Our methodology transforms everyday technology investments into streamlined, secure and scalable solutions.