News

2015-03-10

The Future of Government Surveillance - Looks Like This

Modern targeted surveillance is likely to involve actively breaking into an adversary's computer network and installing malicious software.

2015-03-10

Malware Tracks a Smartphone Without Location Data

The way your smartphone uses power provides a simple way to track it, say computer scientists who have developed an app to prove it.

2015-03-10

Kenya: Step Up Cyber War Against Al Shabaab

The Cyber war against the al Shabaab needs to be stepped up urgently if there should be any legitimate expectation of defeating them and preventing further loss of lives of people in Kenya, Somalia and the whole region.

2015-03-09

More CEOs Discover Power of Analytics

CEOs are looking to digital tools such as data analytics, mobile, cybersecurity and the Internet of Things to help them seize bigger opportunities ..

2015-03-06

Protecting Your Data Wherever It Goes

The Top 4 Places Your Files Are At Risk (Infographic) : Seclore

2015-03-06

What happens when the Internet of Things becomes AI?

When Stephen Hawking, Bill Gates and Elon Musk all agree on something, it’s worth paying attention.

2015-03-09

Snowden Ready to Return to the US 'if he can get a fair trial'

Former U.S. National Security Agency employee Edward Snowden is ready to return home if he is guaranteed a fair trial, says his lawyer.

2015-03-03

Could the Internet be the next ‘failed state’?

If you think the Internet can go on being just like it is, here's some bad news. In the New York City of the late 1970s, things looked bad. The city government was bankrupt, urban blight was rampant, and crime was high. But people still went to the city every day because that was where everything was happening. And despite the foreboding feelings hanging over New York at the time, the vast majority of those people had at most minor brushes with crime.

2015-02-19

Memex – The new search tool for the Deep Web

DARPA has publicly presented for the first time a new set of search tools called Memex, which will improve also researches into the “Deep Web”.

2015-02-28

How News Cards Are Quietly Transforming The Web

Cards, a technology that collapses online content into digital containers for fast and easy consumption has begun a transformation across the web.

2015-03-19

MI5 seeks new powers after Paris magazine attack

Head of MI5 Andrew Parker describes Charlie Hebdo outrage as ‘a terrible reminder of the intentions of those who wish us harm’

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

TenIntelligence

TenIntelligence

TenIntelligence provides due diligence, brand protection and fraud investigation services including digital forensics.

Ubisecure

Ubisecure

Ubisecure provide Identity & Access Management solutions.

Wotan Monitoring

Wotan Monitoring

Wotan Monitoring is the software solution for fully automatic process monitoring, infrastructure monitoring and end-to-end monitoring.

Digittrade

Digittrade

Digittrade develop and produce external encrypted hard disks and secure communications apps.

Critical Insight

Critical Insight

Critical Insight provide Managed Detection and Response, Vulnerability Detection, and Consulting Services to help you secure your mission-critical systems.

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

GCSCC's work is focused on developing a framework for understanding what works, what doesn’t work and why – across all areas of cybersecurity capacity.

LOGbinder

LOGbinder

LOGbinder eliminates blind spots in security intelligence for endpoints and applications.

CyberCyte

CyberCyte

CyberCyte provides a disruptive built-in integrated physical, network and perimeter security solution framework.

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

AWS Marketplace eBook: Optimizing your cloud deployments to accelerate cloud activities, reduce costs, and improve customer experience.

Nitrokey

Nitrokey

Nitrokey is the world-leading company in open source security hardware. Nitrokey develops IT security hardware for data encryption, key management and user authentication.

Aura

Aura

Aura is a mission driven technology company dedicated to creating a safer internet for everyone. We’re making comprehensive digital security that's simple to understand and easy to use.

Cyberani Solutions

Cyberani Solutions

Cyberani Solutions was created to fulfill the cybersecurity needs of industry and government in Saudi Arabia, and across the Middle East and North Africa regions.

Tidal Cyber

Tidal Cyber

We formed Tidal for one simple reason—we believe that defenders need and deserve tools and services that make achieving the benefits of threat-informed defense practical and sustainable.

Endor Labs

Endor Labs

Endor Labs gives developers and security teams the context they need to prioritize open source risk.

SeQure

SeQure

SeQure is a cutting-edge startup specializing in the development of advanced security infrastructure for artificial intelligence and blockchain.

Cyviation

Cyviation

Cyviation's mission is to mitigate ever-growing and menacing Cyber Security threats, focusing on aircraft, airlines and airports.