News

2015-12-18

Age of Hackers Drops to 17

The UK National Crime Agency says the average age of suspected cyber-attackers has dropped dramatically to just 17.

2015-12-14

French Government Proposals To Block Tor and Forbid Free Wi-Fi

Le Monde reports two proposals for legislation, one around the state of emergency, and the other related to counterterrorism measures.

2015-12-22

Can You Solve The GCHQ Christmas Card Puzzle?

The British surveillance & intelligence agency GCHQ is sending out a Christmas card this year with a brain - teasing puzzle.

2015-12-18

Spies Want IBM’s Quantum Computer

One key area where quantum computers could have an impact is encryption and security.

2015-12-11

The Biggest Cybersecurity Risk Is Not Identity Theft

Hackers who deface websites, apps and other sources to spread false information present a very real threat.

2015-12-11

Microsoft Leads FBI Coalition To Destroy Botnet

To take down Win32/Dorkbot, Microsoft worked with ESET, Department of Homeland Security, Europol, FBI and Interpol.

2015-12-11

Australian Degree Course on Cyber War and Peace

An online Masters degree to equip graduate students with abilities to understand operational, ethical & informational challenges for IT security.

2015-12-09

Cyber War Pre-emption Is The Key to Defense

The United States' best defense against a crippling cyber attack could be a more visible offensive lineup.

2015-12-09

Gateway For Hackers

Routers - devices that connect people to the Web, sometimes called “the backbone of the Internet”, are dangerously vulnerable to hackers.

2015-12-09

Has The US Become Complacent About Resisting Cyber Attacks?

No longer in the news: Accounts of cyberattacks these days seem to produce yawns.

2015-12-09

First Ever EU Rules On Cybersecurity

Europe's critical digital infrastructure will be required to meet basic security standards.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Wisegate

Wisegate

Wisegate is a community of IT experts providing advisory services on all areas of IT including security.

AimBrain

AimBrain

AimBrain tools detect and prevent fraud, faster and more accurately than ever before.

Vanbreda

Vanbreda

Vanbreda Risk & Benefits is the largest independent insurance broker and risk consultant in Belgium and the leading insurance partner in the Benelux.

Ockam

Ockam

Ockam gives you the tools you need to establish an architecture for trust within your connected device applications.

Bitfury Group

Bitfury Group

Bitfury Group is the largest full-service blockchain technology company in the world.

Blockchains LLC

Blockchains LLC

Blockchains is committed to changing the world for the better. Using blockchain and other innovative technologies, we’ll build new systems, new security, and new interactions.

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation (EIF) of Armenia is one of the largest technology business incubators and IT development agencies in the region.

Authomize

Authomize

Authomize aggregates identities and authorization mechanisms from any applications around your hybrid environment into one unified platform so you can easily and rapidly manage and secure all users.

Clario Tech

Clario Tech

Clario is a simple, comprehensive, personalized protection app. It comes with a full suite of intelligent security software and intelligent people to help you live a better, safer digital life.

Fortiedge

Fortiedge

Fortiedge is an IT Security solution provider specializing in Cyber Security practices and solutions for our clients.

HADESS

HADESS

We are "Hadess", a group of cyber security experts and white hat hackers.

CyberFOX

CyberFOX

CyberFOX is a global cybersecurity solutions provider focused on identity access management (IAM) for managed service providers (MSPs) and IT professionals.

Versent

Versent

Versent is an Australian-born technology company, focused on architecting, building & operating cloud native applications, data streams, platforms, and services.

SecureClaw

SecureClaw

SecureClaw offers specialized cybersecurity consultation, various products, and a range of services to meet your company's business domain needs.

Levio

Levio

Levio is a digital native business and technology consulting firm. As a true partner from start to finish, our goal is a long-lasting transformation that’s right for your business model.

LetsData

LetsData

LetsData uses AI to provide governments, intergovernmental organizations, civil society, and businesses with data-empowered decisions on communication in the age of online disinformation.