News

2018-08-29

What Is Stuxnet And Who Created It?

Thanks to Stuxnet, we now live in a world where covertly inserted malicious code can destroy machinery and stop (or start) a war.

2018-08-29

How Silicon Valley Became A Den Of Spies

Foreign spies have been showing up in Silicon Valley for a very long time and that has never been more true than today.

2018-08-28

One Answer To Cyber Attacks Is To Hack Back

Experts think the US government, along with private companies should go on the offensive by using the hackers’ own methods against them.

2018-08-28

The US Is Losing the Information War To Russia

NATO see no evidence that Russia's disinformation efforts have slackened, nor that the US is equipped to develop an effective response.

2018-08-30

World’s Top 20 Cybersecurity Companies

The experts at Pagan Research have ranked the top 20 in the Cybersecurity 500 leading cybersecurity companies.

2018-08-28

Nobody Is Talking About The  Age of Cyberwar

There is little debate about using cyber weapons, perhaps because these weapons remain invisible, the attacks deniable and the results uncertain.

2018-08-28

Blockchain Enables Anarchy

As soon as you distribute information on multiple servers, some of which are under other people’s control, you lose a measure of control.

2018-08-24

Facebook & Instagram Now Show How Long You Use Them

Giving users a raw count of the minutes they’ve spent in their apps plus their average usage is a good start to making users more mindful.

2018-08-23

Cyber Audits Can Save Businesses $1.5m

IBM say that systematic monitoring, logging, and auditing procedures can cut the average cost of each security breach by more than $1 million.

2018-08-24

The Market For Cybercrime Tools Is Thriving

A Dark Web survey shows cyber criminals no longer need deep technical knowledge - any type of attack is now feasible given sufficient funding.

2018-08-03

Germany Wants A Legal Framework For Cyberwar

In response to domestic intelligence reports of surging nation-state attacks against it, Germany wants to actively respond to acts of cyberwar.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CyberScout

CyberScout

Cyberscout delivers the latest cybersecurity education, protection and resolutions services. We also provide swift incident response services around the world.

ESG Elektroniksystem- und Logistik-GmbH

ESG Elektroniksystem- und Logistik-GmbH

ESG offer a comprehensive portfolio of cyber and IT services ranging from consulting, solutions and operations to testing, simulation and training.

UK Cyber Security Forum

UK Cyber Security Forum

UK Cyber Security Forum is a community interest group for cyber security companies in the UK.

Navaio IT Security

Navaio IT Security

Navaio helps clients with IT Security related challenges with a primary focus on Identity and Access Management, Data Governance, User Awareness and Cyber Resilience Services.

NewGens

NewGens

NewGens is a solution and service provider to banking institutions in the APAC region. Areas of expertise include cybersecurity, AML, fruad prevention, compliance and risk management.

Savanti Consulting

Savanti Consulting

Savanti provides practitioner-led cyber security services tailored to meet each organisation’s unique requirements.

Blackpoint Cyber

Blackpoint Cyber

Blackpoint’s mission is to provide effective, affordable real-time threat detection and response to organizations of all sizes around the world.

PreEmptive Solutions

PreEmptive Solutions

PreEmptive Protection hit the sweet spot between cost, convenience and functionality by helping you protect and secure your apps in a smarter way.

ProofID

ProofID

ProofID is a specialist provider of Identity Access Management (IAM) solutions. We focus on the solving the complex needs of the modern enterprise.

Network Utilities (NetUtils)

Network Utilities (NetUtils)

Network Utilities provide identity centric network and security solutions to organisations from Telecoms and ISPs to SMEs and large corporates.

QGroup

QGroup

QGroup has been re-designing the consultancy industry since 2012. We're a rapidly expanding group of consulting companies that deliver bespoke IT services including cybersecurity.

Logically.ai

Logically.ai

Logically combines artificial intelligence with expert analysts to tackle harmful and manipulative content at speed and scale.

Cyber-Security Council Germany

Cyber-Security Council Germany

The German Cyber Security Council's objective is to consult businesses, government agencies and political decision-makers and to support them against cybercrime.

Plex IT

Plex IT

Plex IT provides managed IT services to organisations along with managed security services.

PolySwarm

PolySwarm

PolySwarm is a crowdsourced threat intelligence marketplace that provides a more effective way to detect, analyze and respond to the latest threats.

CampusGuard

CampusGuard

CampusGuard focuses on the cybersecurity and compliance needs of campus-based organizations including higher education, healthcare, and state and local government.