News

2016-07-27

Cyber Security is Now Business Critical (£)

Whatever their sector or size cybersecurity is now critical for any organisation.

2016-07-27

Cyber-Attack Takes Down Pokémon Go

Hacking group going by the name of PoodleCorp has claimed responsibility for a massive DDoS attack which brought down Pokémon Go.

2016-07-27

The Future Of Big Data Science

Apache Spark: An open source tool is opening up big possibilities for Data Science

2016-07-28

Google Wants Your Medical Records

Google's DeepMind has moved on from playing Go to more serious matters - attempting to solve some of the world's biggest health problems.

2016-07-27

US Defense Intelligence Agency Is Researching Employee Social Media Histories

The Pentagon is researching a "social media checks" pilot scheme that would analyze public posts to help determine an employee's suitability.

2016-07-27

Ransomware: Should You Pay The Ransom?

Security professionals dread the day when they learn that ransomware has infiltrated their network and started encrypting files & drives.

2016-07-26

US Carmakers Want Hackers To Help Them Improve Cybesecurity

Today's automobile is rapidly becoming a computer on wheels, with more micro-processing power than can be found in a typical home or office.

2016-07-26

Snowden iPhone Case Alerts Users To Surveillance

Edward Snowden has helped design a mobile phone case that shows when a smartphone is transmitting information that could be monitored.

2016-07-26

US Cyber Mission Force Nearly Ready for Action

The new cyber force will eventually contain over 6000 operatives split into 133 groups, with both offensive and defensive missions.

2016-07-26

Cloud Video Architecture Improves Emergency Services Response

Visual data can be critical in knowing where to send emergency services personnel, tracking suspects, or detecting hazardous materials.

2016-07-25

Cybersecurity: The Human Dynamic

Ultimately, cyber security is governed by choices made by a human sat at a keyboard.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Infrascale

Infrascale

Infrascale specialise in providing cloud backup and disaster recovery services.

LogicManager

LogicManager

LogicManager offer a complete set of IT governance, risk and compliance software solutions and advisory services.

SecuTech Solutions

SecuTech Solutions

SecuTech is a global leader in providing strong authentication and software licensing management solutions.

IUCC Cyber Unit - Israel

IUCC Cyber Unit - Israel

IUCC Cyber Unit safeguards Israel’s National Research & Education Network (NREN).

Relution

Relution

Relution is the Unified Endpoint Management platform for innovative companies and educational institutions. It enables you to manage your mobile apps and devices easily and securely.

NTIC Cyber Center

NTIC Cyber Center

NTIC Cyber Center is an organization dedicated to making the National Capital Region (Washington DC) more resilient to cyber-attacks.

AnChain.AI

AnChain.AI

AnChain.AI's analytics platform proactively protects crypto assets by providing proprietary artificial intelligence, knowledge graphs, and threat intelligence on blockchain transactions.

SyncDog

SyncDog

SyncDog is a leader in enterprise security and the preeminent vendor for containerized mobile application security across cloud & on-premise computing environments.

ValueMentor

ValueMentor

ValueMentor is a leading cyber security service provider in the Middle East. We enable clients to reduce risk by taking a strategic approach to cybersecurity.

ECHO Project

ECHO Project

The main objective of ECHO is to strengthen the cyber defence of the European Union, enhancing Europe’s technological sovereignty through effective and efficient multi-sector collaboration.

LogicBoost Labs

LogicBoost Labs

LogicBoost Labs has the expertise, experience, funding and connections to make your startup succeed. We are always interested in new ways to change the world for the better.

NewAE Technology

NewAE Technology

NewAE Technology is revolutionizing the hardware security market by making every engineer and designer aware of side-channel power analysis and glitching as important attack vectors.

iNovex

iNovex

iNovex is a community of innovators that work together to solve hard problems. We partner with you to meet problems head-on and push boundaries with technology solutions.

Millennium Corporation

Millennium Corporation

For nearly two decades, Millennium Corporation has been operating on the leading edge of cybersecurity.

Avanade

Avanade

Avanade is a leading provider of innovative digital, cloud and advisory services, industry solutions and design-led experiences across the Microsoft ecosystem.

SafeBase

SafeBase

Safebase provide the infrastructure for Trust Communication. Our Trust Center enables Security and Sales teams to share and automate access to security, compliance, and privacy information.