News

2015-11-11

Energy Under Hacktivist Threat

The FBI say that politically motivated Hackers are the second biggest threat to the U.S Energy sector, after it's own employees.

2015-11-11

Who Is In Charge if a Massive Cyber Attack Strikes the U.S?

Large scale cyber attacks on infrastructure may be unlikely, but if it happens, the chain of command is far from clear.

2015-11-13

EU votes Snowden Human Rights Asylum

MEPs last week voted Edward Snowden should be granted asylum in Europe on the grounds that he is a “defender of human rights.”

2015-11-12

MI5 Relies on Hacking

The British spy agency says it has “relied” on hacking techniques in “the overwhelming majority of high priority investigations" over the past year.

2015-11-12

The Dark Side of the Fourth Industrial Revolution – and How To Avoid It

With the Fourth Industrial Revolution and its promise of technological progress, comes a dark reality. Opinion By Espen Barth Eide and Anja Kaspersen

2015-11-12

The Shrinking of the Big Data Promise

The Big Data success stories for predicting human behavior over long terms don’t bear scrutiny. Opinion By Cory Doctorow

2015-11-14

10 Extreme Hacks

Any device with a computer chip can be hacked, but not all hacks are created equal. Truly innovative hacks are rare.

2015-11-12

Spyware Rises in Popularity with Governments

FinFisher was being used for activities beyond tracking criminals.

2015-12-28

Enterprises Don’t Have Big Data, They Have Bad Data

Big data alone is silly. Building an enterprise with smart, usable data is what every company should strive to create.

2015-11-12

How are Businesses Responding to Cyber Risks?

As cyber-risks become increasingly prominent concerns in boardrooms business leaders are increasingly rethinking cybersecurity practices.

2015-11-10

Military Robots Will Predict Your Next Move

New research may enable robotic-armed guards, or just help self-driving cars get through a four-way stop.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

Contrast Security

Contrast Security

Contrast Security is the leader in modernized application security, embedding code analysis and attack prevention directly into software.

Social-Engineer Inc

Social-Engineer Inc

Social-Engineer is a consulting and training company specializing in the science of social engineering in the context of digital security.

LogRhythm

LogRhythm

LogRhythm's security platform unifies SIEM, log management, network and endpoint monitoring, user behaviour analytics, security automation and advanced security analytics.

Wooxo

Wooxo

Wooxo provides business security and continuity solutions to protect business data for organisation of all sizes.

IDpendant

IDpendant

IDpendant offers a wide range of services, including authentication technology, client security products, single sign on systems, encryption solutions, card and mobile device management systems.

GraVoc

GraVoc

GraVoc is a technology-consulting firm committed to solving business problems for customers through the development, implementation, & support of technology-based solutions.

Datec PNG

Datec PNG

Datec is the the largest end-to-end information and communications technology solutions and services provider in Papua New Guinea.

DeviceAssure

DeviceAssure

DeviceAssure enables organizations to reliably identify counterfeit and non-standard devices with a real-time check on a device's authenticity.

Startupbootcamp Fintech & Cybersecurity

Startupbootcamp Fintech & Cybersecurity

Startupbootcamp is the world’s largest network of multi-corporate backed accelerators helping startups scale internationally.

Peraton

Peraton

Peraton provides innovative solutions for the most sensitive and critical programs in government today, developed and executed by scientists, engineers, and other experts.

Adarma Security

Adarma Security

Adarma are specialists in threat management including SOC design, build & operation.

Network Utilities (NetUtils)

Network Utilities (NetUtils)

Network Utilities provide identity centric network and security solutions to organisations from Telecoms and ISPs to SMEs and large corporates.

McCrary Institute - Auburn University

McCrary Institute - Auburn University

The McCrary Institute seeks practical solutions to real-world problems in the areas of cyber and critical infrastructure security.

CyberCatch

CyberCatch

CyberCatch provides an innovative cybersecurity Software-as-a-Service (SaaS) platform designed for SMBs.

Ultima

Ultima

Ultima are on a mission to help businesses unlock their true potential by using the right IT to protect your company’s revenue and reputation – 24/7.

Alchemy Security Consulting

Alchemy Security Consulting

Alchemy Security Consulting specialise in offensive and defensive cyber security. We find the weak link in your security so you can patch it up fast and avoid being hacked.