News

2015-08-14

Hackers Target Internet Address Bug to Disrupt Sites

A recently identified bug allows attackers to crash software, taking the DNS service offline & preventing URLs from working.

2015-08-14

Predictive Policing Technology Arrests

An intelligence led computer programme that uses an algorithm to pin-point officers to zones where crime is most likely to occur.

2015-08-14

U.S Elections and the Coming Cyber Wars

The row over Hilary Clinton's private email server and redacted communications rumbles on.

2015-08-14

Malaysia: Umno members told to go on ‘cyber war’

Social Media leads the contest as politics in Malaysia turn nasty.

2015-08-19

Russia, China & U.S. Engage in Cyber War

The cyber warfare between the U.S.A, Russia and China is part of an overall epoch-defining conflict between the three nations.

2015-08-14

The NSA Playset: 5 Better Tools To Defend Systems

Cutting edge security tools made accessible & easier to use, tapping into the open source software community.

2015-08-14

Twitter says U.S Government Want More User Account Information

Twitter reveals that requests for account information from governments has jumped 52%, mostly to do with criminal investigations.

2015-08-14

France & UK on the Edge of Kafkaesque Surveillance

Are the surveillance tools that France and Britain are using too blunt and intrusive for modern democracies?

2015-08-14

HTC: Rendered Worthless By Insecurity?

Competition from above and below, combined with a shocking security lapse, knock HTC for six.

2015-08-14

US Internet Giants Join to Curb Child Sex Abuse

Facebook, Google, Microsoft, Twitter and Yahoo are doing the right thing.

2015-08-14

Darwinian Robotic Evolution

Artificial evolution of physical systems to create self-learning, improving robots.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Menlo Security

Menlo Security

Menlo Security protects organizations from cyberattacks by eliminating the threat of malware from the web, documents, and email.

Cross Identity

Cross Identity

Cross Identity (formerly Ilantus Technologies) is a complete IAM solution that is deep, comprehensive, and can be implemented even by non-IT persons.

AET Europe

AET Europe

AET Europe is specialised in creating technological solutions for user identification and authentication.

Lynxspring

Lynxspring

Lynxspring provides edge-to-enterprise solutions and IoT technology for intelligent buildings, energy management, equipment control and specialty machine-to-machine applications.

limes datentechnik

limes datentechnik

limes datentechnik is an authority in the fields of cryptography and data compression. The FLAM product family is an internationally accepted standard for efficient and safe handling of data.

SGBox

SGBox

SGBox is a highly flexible and scalable solution for IT security. Choose the modules which your company needs and implement it without any modification to your network infrastructure.

BCN Group

BCN Group

BCN Group is an agile IT solutions provider. We are experts in delivering and managing business-critical technology solutions.

Psybersafe

Psybersafe

Psybersafe is a hands-on, behaviour-changing training system that keeps your people and your business cyber safe.

Sotero

Sotero

Sotero is the first cloud-native, zero trust data security platform that consolidates your entire security stack into one easy-to-manage environment.

J.S. Held

J.S. Held

J.S. Held is a global consulting firm providing technical, scientific, and financial expertise across all assets and value at risk.

Sev1Tech

Sev1Tech

Sev1Tech is a leading provider of IT modernization, cloud, cybersecurity, engineering, fielding, training, and program support services.

Cytidel

Cytidel

Cytidel is a vulnerability and risk management platform that utilises threat and business intelligence to help IT Security teams.

B&L PC Solutions

B&L PC Solutions

B&L PC Solutions deliver top cyber security services on Long Island and New York city to protect businesses from evolving online threats.

Cybit

Cybit

Cybit is the one-stop-shop for digital transformation that scales in line with your growth.

Onum

Onum

Onum helps security and IT leaders focus on the data that's most important. Gain control of your data by cutting through the noise for deep insights in real time.

Techtron Business IT Services

Techtron Business IT Services

TECHTRON has been providing business IT services since 2004. Our focus is on SMBs and we are good at it. Our customers trust us, they love our high levels of service, and they love what we stand for.