News

2018-06-18

How Computer Data Helped Investigate Quebec Shooter

The criminal proceedings against Quebec's mosque shooter provided insight on police use of computers to extract information about a suspect.

2018-06-19

Cryptocurrency Malware Theft Is Worth Millions

The market for malware and tools designed specifically for the theft of cryptocurrency is booming with $1.1 billion stolen this year.

2018-06-18

Profile Of An Ethical Bug Hunter

Ethical hacking has moved on from academic researchers and lone wolf hackers and has become a big business, in the form of bug hunting.

2018-06-18

Israeli Cybersecurity Company Beats All Hackers

In a special challenge to hackers Cyber 2.0 offered a cash prize for any hacker able to penetrate the company's online defences.

2018-06-18

Facebook’s Head Of Policy Quits Amid Data Misuse Controversey

Facebook's Elliot Schrage is stepping down after a decade at the company, a rare departure among the senior ranks at the social network.

2018-06-18

Expect A Cyber Attack On The FIFA World Cup In Russia

The Wold Cup could suffer attack vectors from fake ticket spam and infiltration of governing body infrastructure with destructive payloads.

2018-06-15

EC-Council Sets New Application Security Training Standards

The information security certification body, EC-Council, is set to redefine application security by introducing an all new certification program.

2018-06-18

Are US Federal Cyber Workers Good Enough?

US government agencies have made mixed progress at ensuring their cybersecurity workers are properly trained and credentialed.

2018-06-18

World First Police 3D Security Scanner

SWORD: A smartphone app with facial recognition that can a detect a carried weapon or explosives without the need for a physical search.

2018-06-15

NCSC Investigate Giant Dixons Data Breach

The NCSC is working alongside the retailer to detect the hackers who took 5.9 million payment card details and 1.2 million personal data records.

2018-06-18

Cyber Security Intelligence Website Upgrade

The design and function of this website has been upgraded to make information more easily accessible to users.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

InfoSec People

InfoSec People

InfoSec People is a boutique cyber and technology recruitment consultancy, built by genuine experts.

Radiant Logic

Radiant Logic

Radiant Logic is a market-leading provider of federated identity solutions based on virtualization, and delivers simple, logical, and standards-based access to all identities within an organization.

UpGuard

UpGuard

UpGuard's discovery engine brings visibility to complex IT environments, enabling teams to identify risk, confirm compliance and make business safer.

CompliancePoint

CompliancePoint

We design and implement strategies, processes & procedures to mitigate risk, reach compliance goals, protect data assets, and meet industry standards.

SecureKey Technologies

SecureKey Technologies

SecureKey is a leading identity and authentication provider that simplifies consumer access to online services and applications.

CTERA Networks

CTERA Networks

CTERA provides cloud storage solutions that enable service providers and enterprises to launch managed storage, backup, file sharing and mobile collaboration services using a single platform.

AXA XL

AXA XL

AXA XL is the P&C and Specialty Risk Division of AXA. Professional insurance products include Cyber Insurance.

Bitfury Group

Bitfury Group

Bitfury Group is the largest full-service blockchain technology company in the world.

Lionfish Cyber Security

Lionfish Cyber Security

Lionfish Cyber Evolution & Empowerment Model™ empowers SMBs to prepare and protect themselves against cyber threats using a unique combination of on-demand training, support and managed services.

PPC Protect

PPC Protect

PPC Protect is an entirely automated click fraud prevention solution.

Tego Cyber

Tego Cyber

Tego Cyber delivers a state-of-the-art threat intelligence platform that helps enterprises deploy the proper resolution to an identified threat before the enterprise is compromised.

Redpoint Security

Redpoint Security

Redpoint Security is an application security consulting firm that is focused on all aspects of code security.

Com Olho

Com Olho

Com Olho provides the measurement, analytics, quality assurance, and fraud protection technologies brands need for their business and customers.

Inflection Point Ventures (IPV)

Inflection Point Ventures (IPV)

Inflection Point Ventures (IPV) is a 6000+ members angel investing firm which supports new-age entrepreneurs by connecting them with a diverse group of investors.

iSTORM

iSTORM

iStorm specialise in supporting organisations who require a range of Privacy, Security and Penetration testing related services.

Auriga

Auriga

Auriga create innovative software and have become a benchmark for high quality banking software including cyber security solutions to protect business critical devices.