FREE TO VIEW


« Back to News

2018-09-28

Hackers Stealing High Grade Academic Research

Iranian hackers obtained access to secure university systems and research databases by phishing university staff & using spoof domains.

2018-09-27

Hackers Are Fighting A Surrogate Cold War

Hybrid warfare incorporates cyber tactics focusing on soft targets, disrupting businesses & parts of the economy previously thought safe from attack.

2018-09-27

Security Flaws In Smart City Technology

The “smart city” sounds like a digital utopia, but like the rest of the Internet of Things (IoT) ecosystem, security is always a concern.

2018-09-27

Dubai: Internet City

Dubai is fast becoming a smart city, with drones, robots and a special economic zone central to its plans to attract more investment.

2018-09-26

Canada Is Suspicions Of Huawei

Canada is working to minimise cyber threats from equipment made by foreign telecommunications companies, including China’s Huawei.

2018-09-26

AI Will Create 58 Million New Jobs By 2022

The growth of artificial intelligence could create 58 million net new jobs in the near term future, according to the World Economic Forum.

2018-10-01

Smartphones Are Working For Dutch Police

The Dutch National Police issued its officers and staff with 63,000 smartphones, creating numerous opportunities to do things differently.

2018-09-26

New Phishing Attack Uses An Old Trick

A new phishing campaign is using an old trick by claiming to offer a tax refund which can only be claimed online.

2018-09-25

Insurance Experts Expect Higher Cyber Losses

Insurers expect increased cyber-related losses across all business lines, driven by increasing reliance on technology and major cyber attacks.

2018-09-25

The Maritime Industry's Slow Boat To Cybersecurity

Despite its critical global role the maritime transportation sector has been slow to wake up to the need to protect its digital systems and assets.

2018-09-25

White House To Step Up Cyber Counter-Offensive

National Security Adviser Bolton warns foreign hackers the US will increase offensive measures as part of a new national cyber security strategy.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Redcentric

Redcentric

Redcentric is a leading UK IT managed services provider. We deliver managed IT, cloud computing, data backup, information security services and managed networks.

BSA - The Software Alliance

BSA - The Software Alliance

BSA is the leading advocate for the global software industry before governments and in the international marketplace.

Clavister

Clavister

Clavister is a network security vendor delivering a full range of network security solutions for both physical and virtualized environments.

Cyber DriveWare

Cyber DriveWare

DriveWare analyzes new traffic in the I/O layer and blocks malware and cyber attacks which organizations have no means to protect against.

CICRA

CICRA

CICRA is Sri Lanka's pioneering cyber security training and consultancy provider.

Sky Data Vault

Sky Data Vault

Sky Data Vault provide the simplest and most cost effective method of Disaster Recovery / Business Continuity for mission critical systems and applications.

Lifespan Technology

Lifespan Technology

Lifespan Technology provides the full range of IT Asset Disposition services. This includes hardware recycling and disposal, data destruction, and hardware resale.

Hacken

Hacken

Hacken provide a range of cybersecurity services including security assessments, blockchain security audits, and secure software development.

Quantstamp

Quantstamp

Quantstamp are experts in Smart Contract Security Audits. We provide verification that your decentralized system works as intended.

SOSA

SOSA

SOSA facilitates new growth opportunities by connecting the dots between industry verticals and innovation ecosystems around the world.

Nokia

Nokia

Nokia is a proven leader in fixed, mobile and IoT security offering capabilities that range from systems design to integration and support.

Informer

Informer

Informer provides an Attack Surface Management SaaS platform alongside penetration testing services. We combine machine learning and human intelligence to reduce cyber risk.

Cufflink

Cufflink

Cufflink makes your business more secure, compliant and trusted. We limit the likelihood and impact of a data breach by controlling exactly what can and can't be done with personal data.

NREL Clean Energy Cybersecurity Accelerator (CECA)

NREL Clean Energy Cybersecurity Accelerator (CECA)

The Clean Energy Cybersecurity Accelerator advances cyber innovation to defend modern, renewable energy technologies against high-priority cybersecurity risks to the energy sector.

Siometrix

Siometrix

Siometrix addresses digital identity fraud. It steals your attacker's time and prevents many prevalent attack vectors.

Neosoft

Neosoft

Néosoft is an independent digital transformation consulting group with expertise in Consulting & Agility, Cybersecurity, Data, DevOps, Infrastructure & Cloud and Software Engineering.