News

2016-04-12

Islamic State Recruits Indian Hackers

Islamic State is recruiting hackers in India to break into government systems and paying them over $10,000 for every job they do.

2016-04-13

Super High-Speed Internet

A startup, Starry, has announced a remarkable plan to bring gigabit-speed Internet access without expensive fiber cables.

2016-04-12

Israeli Drone Hacked By Five Eyes Intelligence

British and American spies collected live video from Israeli drones as part of a classified program code-named “Anarchist” operating from Cyprus.

2016-04-11

Creating A Working Culture Of Computer Security (£)

Computer attacks have become commonplace and explaining just what a particular business should do to reduce the issues & problems is unclear.

2016-04-15

Data Analytics Is Driving IT

Data analytics is one of the top areas of IT investments & organisations expect to substantially increase their spending on this in 2016.

2016-04-18

Exposing The Economics Behind Hacking

A new survey by the Ponemon Institute provides insight into topics like the average earnings of a cyber-attacker.

2016-04-13

Cyber Crime Forensics

Cybercrime is the fastest growing area of crime in the world. The demand for cyber security professionals is higher than ever.

2016-04-13

Cybersecurity Un-Safe Investments in 2015

Investment in cyber-security companies has been anything but safe in 2015.

2016-04-13

Mapping Unknown Risk

Business and cyber attackers are at a constant war. Its scale is enormous and the techniques deployed are incredibly intricate.

2016-04-15

Three Reasons To Revise Your Cyber Security Plans

A cybersecurity strategy that is not up to date with current security tools & research leaves your organizations open to attack.

2016-04-13

People Are (Still) The Biggest Security Risks

Curiosity: It's better to think before you click.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Bsquare

Bsquare

Bsquare DataV software and engineering services help enterprises implement business-focused Internet of Things systems.

TestingXperts

TestingXperts

TestingXperts is a specialist software QA and testing company.

Citicus

Citicus

Citicus provides world-class security, risk and compliance management software, plus supporting services.

Centre for Development of Advanced Computing (C-DAC)

Centre for Development of Advanced Computing (C-DAC)

C-DAC is the premier R&D organization of the indian Ministry of Electronics & Information Technology. Areas of research include cyber security.

Riskified

Riskified

Riskified is a leading eCommerce fraud-prevention company, trusted by hundreds of global brands – from luxury fashion houses and retail chains, to gift card and ticket marketplaces.

Conviso

Conviso

Conviso is a consulting company specialized in Application Security and Security Research.

Secure Blockchain Technologies (SBT)

Secure Blockchain Technologies (SBT)

SBT is a team of Enterprise IT Security Professionals weaving security and Blockchain Technology into our customer’s operational fabric.

DarkOwl

DarkOwl

DarkOwl provides the world’s largest index of darknet content and the tools to efficiently find leaked or otherwise compromised sensitive data.

Activu

Activu

Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical operations including network security.

ConnectSecure

ConnectSecure

ConnectSecure (formerly CyberCNS) is a global cybersecurity company that delivers tools to identify and address vulnerabilities and manage compliance requirements.

J.S. Held

J.S. Held

J.S. Held is a global consulting firm providing technical, scientific, and financial expertise across all assets and value at risk.

Vali Cyber

Vali Cyber

Vali Cyber was founded in 2020 with the mission of addressing the specific cybersecurity needs of Linux.

Guardsman Cyber Intelligence (GCI)

Guardsman Cyber Intelligence (GCI)

GCI provides proven cyber intelligence solutions to protect your business against ever present physical and digital threats shadowing your online business.

CyberUp

CyberUp

CyberUp is a nonprofit organization created to strengthen the cybersecurity workforce. We help employers reimagine how they grow and scale their cybersecurity workforce.

DataStealth

DataStealth

DataStealth is a data protection platform that allows organizations to discover, classify, and protect their most sensitive data and documents.

SecurWeave

SecurWeave

SecurWeave's Configurable Hardware Enforced Safety and Security (CHESS) platform has been designed to meet the security and safety criticality needs of the evolving digital industry.