News

2018-07-18

A New Heavyweight Drone

The Sukhoi Aircraft Company is building a new multi-purpose heavy drone as a technology demonstrator to test new applications.

2018-07-17

Putin Says Russia The Target Of 25m World Cup Cyber Attacks

Putin: "Almost 25m cyber attacks and other criminal acts on the information structures in Russia, linked...to the World Cup, were neutralised"

2018-07-17

Don't Leave AI Governance To The Machines

Now AI has the ability to reach its own conclusions, governance over the machines is critical for both business executives & customers.

2018-07-17

For Sale: Access To Airport Security

Cybercriminals are offering stolen access to airport security systems including transit, surveillance & building automation systems for only $10.

2018-07-16

The Mueller Investigation Identifies Russian Spies

US Intelligence agencies stand vindicated as Special Prosecutor Mueller indicts agents of the Russian military for 2016 electoral interference.

2018-07-16

US Dark Web Raids Lead to Arrests And Seizures

Guns, drugs, cars, gold bars, crytocurrency and crypto-mining gear all seized as US Homeland Security agents arrest 35+ DarkWeb vendors.

2018-07-16

What Does The EU Cybersecurity Vote Mean To You?

EU lawmakers have voted in favour of giving more power and money to the European Network and Information Security Agency (ENISA).

2018-07-16

Is Cyber The Perfect Weapon?

Millions of intrusions into other countries’ networks occur each year, but only a half-dozen or so have done actual significant physical harm.

2018-07-16

Russia Will Keep Up Cyber Attacks For Geo-Political Influence

Ukraine's intelligence chiefs are convinced Russia is committed to using de-stabilising cyber attacks as tools to extend its international influence.

2018-07-16

Coast Guard Academy Creates New Cybersystems Program

The U.S. Coast Guard Academy is now offering an academic program in cyber systems, its first major new initiative in a quarter century.

2018-07-13

Breakthrough Technologies To Combat Insider Threats

Advances in technology have a positive outlook on keeping sensitive data safe. Here are five emerging tools for mitigating insider threats.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

KZ-CERT

KZ-CERT

KZ-CERT is the national Computer Emergency Response Team for Kazakhstan.

Sopra Steria

Sopra Steria

Sopra Steria is a leading European information technology consultancy.

Terranova Security

Terranova Security

Terranova is dedicated to providing information security awareness programs customized to your internal policies and procedures.

_cyel

_cyel

_cyel is introducing a new cybersecurity strategy: not a new generation of patches and firewalls, but moving target security – we take away the targets. Without replacing your existing system.

Cyber Security Centre - Daffodil International University

Cyber Security Centre - Daffodil International University

Cyber Security Centre, DIU is a non-profitable organization which is focused on applied research in cyber security.

ThreadStone Cyber Security

ThreadStone Cyber Security

ThreadStone Cyber Security offer reliable, practical and affordable cyber security solutions for both large and smaller organizations that we develop and deliver ourselves from Europe.

Huntress Labs

Huntress Labs

Huntress provides managed threat detection and response services to uncover and address malicious footholds that slip past your preventive defenses.

WolfSSL

WolfSSL

wolfSSL is an embedded SSL/TLS library providing secure communication for IoT, smart grid, connected home, routers, applications, games, phones, and more.

Cybeta

Cybeta

Cybeta's actionable cybersecurity intelligence keeps your business safe with strategic and operational security recommendations that prevent breaches.

Dynatrace

Dynatrace

Dynatrace provides software intelligence to simplify cloud complexity and accelerate digital transformation.

Digitpol

Digitpol

Digitpol’s Cyber Crime Investigation experts investigate hacking incidents, ransomware, extortion and conduct security audits and IT upgrades.

Qohash

Qohash

With a focus on data security, Qohash supports security, compliance and optimization use cases enhancing your risk management process.

International College For Security Studies (ICSS)

International College For Security Studies (ICSS)

ICSS India offers technical education to students, clients and partners in IT Industry by our well qualified, certified and experienced trainers.

EtherAuthority

EtherAuthority

EtherAuthority's engineering team has been helping blockchain businesses to secure their smart contract based assets since 2018.

Vultara

Vultara

Vultara provides web-based product security risk management tools for electronics manufacturers.

Eclypses

Eclypses

Eclypses has a disrupting cyber technology, offering organizations an advanced data security solution called MicroToken Exchange (MTE).