News

2016-06-07

SWIFT Hackers Linked to ‘North Korean’ Lazarus Group

Symantec can link the malware used by the Sony hackers to attacks on the SWIFT interbank platform.

2016-06-07

Open Source Intelligence Can Predict Terrorist Attacks

Predata specialize in finding links between online interactions and upcoming physical events using metadata from YouTube and Wikipedia

2016-06-07

Unlikely Partners Build High Speed Trans-Atlantic Cable

MAREA: Microsoft and Facebook have recently announced that they are teaming up to build a subsea cable.

2016-06-06

Cyber Security On the High Seas

Cyber technologies have emerged as essential to the operation of maritime cargo vessels.

2016-06-06

The CIA Is Driving Cyber Intelligence In Australia

Cyber intelligence is much more than IT security and Australia is looking for outside help to update its intelligence practices.

2016-06-08

First Shots Of A New Cyber War

Iranian and Saudi Arabian hacking groups are throwing virtual punches. Are the two countries heading towards an outright cyber-war?

2016-06-01

Open Source Data Reveals Police Blunders

A blogger in New York has used public data to prove that the NYPD ticketed thousands of cars that were parked legally.

2016-06-06

Achieving Holistic Cybersecurity

CIOs and CISOs need timely cyber security insights to take proactive action, because today's security challenges are greater than ever.

2016-06-03

Data Analytics Governance Gets More Important

Companies are wading in and testing the potential of data analytics, but it’s important that they understand the limitations of those analytics.

2016-06-03

Ethical Hackers: We Want You For A New Recruit

In The Navy: USN plans to turn some of its sailors into ethical hackers to better defend it its computer networks.

2016-06-01

Not Just A Question Of Money: Cybersecurity And The CFO

Understanding cybersecurity trends & threats and translating that knowledge to board members should become one of the CFO’s key roles.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Lima Networks

Lima Networks

LIMA design and deliver IT Infrastructure solutions and services including managed Security Monitoring services.

Cyber Risk Policies

Cyber Risk Policies

CyberRiskPolicy.com is a joint venture between the Poindexter Surety Group of companies and Gibbs Cyber Security.

KoolSpan

KoolSpan

KoolSpan’s security and privacy solutions address the growing threat of loss or theft of intellectual property, information, and proprietary assets.

Proact IT Group

Proact IT Group

Proact is Europe's leading independent data centre and Cloud services enabler. We deliver flexible, accessible and secure IT solutions and services.

Averon

Averon

Averon's technology is the new gold standard for digital identity - the easiest, fastest and most secure verification solution for users on both WiFi and LTE.

SEWORKS

SEWORKS

SEWORKS provides offensive and defensive app security that ensures mobile and web apps are safe from dangerous hacking threats.

Lynx Technology Partners

Lynx Technology Partners

Lynx Technology Partners is a full service, full life-cycle risk-based security consulting firm.

BehavioSec

BehavioSec

BehavioSec uses the way your customers type, swipe, and hold their devices, and enables them to authenticate themselves through their own behavior patterns.

miniOrange

miniOrange

miniOrange is a cloud and on-premise based identity and access management (IAM) solution provider.

Cybersprint

Cybersprint

Cybersprint's Digital Risk Protection platform continuously monitors your digital footprint so you can make informed decisions on exposure to online threats, identify vulnerabilities and take action.

Celerium

Celerium

Celerium transforms cyber defense for both companies and industry sectors by leveraging cyber threat intelligence to defend against cyber threats and attacks.

CyPhyCon

CyPhyCon

CyPhyCon is an annual event exploring threats and solutions to cyber attacks on cyber-physical systems such as industrial control systems, Internet of Things and Industrial Internet of Things.

Sayata Labs

Sayata Labs

Sayata delivers a streamlined solution for processing cyber policies. Increase profitability with an easy and intuitive platform.

GuardSight

GuardSight

GuardSight is a provider of specialized cybersecurity services to safeguard businesses, government, and remote workers against sophisticated cyber threats.

Nassec

Nassec

Nassec is a Cyber Security firm dedicated to providing the best vulnerability management solutions. We offer tailor-made cyber security solutions based upon your requirements and nature of business.

Cyber Security Canada

Cyber Security Canada

Cyber Security Canada is an accredited Certification Body for government-backed Cyber Security Certification Programs, designed specifically for small and medium-sized Canadian businesses.