News

2019-06-28

SMEs Need A Disaster Recovery Plan

For Small and Medium sized businesses the cost of not updating Disaster Recovery systems can far exceed the price of staying on top of the risks.

2019-06-26

US Cyber Attack On Iran

Unleash The Hackers: US missile forces stand down as President Trump orders Cyber Command to take the lead role in attacking targets in Iran.

2019-06-27

British Police Forensics Attacked

Half of the UK police's forensic data analysis capacity has been knocked out of action following a ransom attack on a major service supplier.

2019-06-27

A Cyber Toolkit For Small Business

Smaller companies need to put in place specific cyber protection solutions to guard against the significant risks of a data breach.

2019-06-27

The New Sophistication Of Nation-State Hacking

The experts at ESET find the Fancy Bears are showing off their sophisticated new toolkit for infecting networks and executing malicious code.

2019-06-26

The Human Cost Of Cyberwar

The Red Cross fear that the proliferation of cyber attacks on critical infrastructure will lead to mass casualties and want a detailed expert inquiry.

2019-06-26

Russia's National AI Strategy Takes Shape

In the global economic race to dominate the new digital economy its between the US tech giants and China. But President Putin has a plan.

2019-06-25

A New Age of Warfare

Cyber war operations are being conducted out of sight, classified, unattributed and increasingly beyond the control of political leaders.

2019-06-25

Cyber Criminals Have Created An Invisible Internet

Successful efforts by police to infiltrate dark net marketplaces are pushing criminal hackers to adopt more secure ways of communicating.

2019-06-24

Spies Use AI-Generated Faces To Connect With Targets

Fake Faces: A vast army of phantom profiles are lurking on LinkedIn, the popular website used for professional networking.

2019-06-24

Turning Amsterdam Into A Smart City

Intelligent Mobility: Amsterdam and MIT are working together using 16th Century technology to produce 21st Century solutions.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

PCI Compliance Guide

PCI Compliance Guide

The PCI Compliance Guide is one of the leading educational websites available focused exclusively on PCI compliance.

Eustema

Eustema

Eustema designs and manages ICT solutions for medium and large organizations.

Neoteric Networks

Neoteric Networks

We deliver a no nonsense procedure to implementing technology. The technology selection process ensures that all customers enjoy an engineered methodology implementing technology.

The Media Trust

The Media Trust

The Media Trust continuously scans websites, ad tags and mobile apps and alerts on anomalies affecting websites and visitors.

Garrison

Garrison

Garrison SAVI® is a unique technology for secure remote browsing that can dramatically change the risk profile for enterprise cyber security.

Woz U

Woz U

Woz U provides best-in-class technology training for Learners, Higher-Ed and Corporations. We focus on the most in-demand occupations such as Software Development, Data Science and Cyber Security.

Sandia National Laboratories

Sandia National Laboratories

Sandia National Laboratories is a premier science and engineering lab for national security and technology innovation. Activity areas include Cyber and Infrastructure Security.

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU-ARCC acts as ITU’s cybersecurity hub in the Arab Region localizing and coordinating cybersecurity initiatives.

National Health Care Anti-Fraud Association (NHCAA)

National Health Care Anti-Fraud Association (NHCAA)

National Health Care Anti-Fraud Association is the leading national organization focused exclusively on the fight against health care fraud.

Caveonix

Caveonix

Caveonix’s RiskForesight TM solution is an automated, proactive risk and compliance platform designed for hybrid and multi-cloud.

CyFIR

CyFIR

CyFIR is a network investigation and Incident Response tool for performing live computer investigations across any size enterprise.

LOGbinder

LOGbinder

LOGbinder eliminates blind spots in security intelligence for endpoints and applications.

Edureka

Edureka

Edureka is an online technology training provider with the most effective learning system in the world. We help professionals learn trending technologies for career growth.

01 Communique Laboratory

01 Communique Laboratory

01 Communique Laboratory is an innovation leader in the new realm of Post-Quantum Cyber Security.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Prophet Security

Prophet Security

Prophet Security empowers organizations to triage, investigate, and respond to alerts with unparalleled speed and accuracy.