FREE TO VIEW


« Back to News

2016-09-02

CIA Sees Intel Data Flood As Both A Benefit And A Danger

Deputy CIA Director Sean Roche reflects on the changes in the nature of intelligence gathering & analysis since the end of the Cold War.

2016-09-01

Benefits of Penetration Testing

The means to identify potential vulnerabilities in your systems and prevent threats from being enacted before they can occur is vital

2016-09-01

Cybercrime Links To Russian State Hackers

The sheer volume and increasing sophistication of criminal cyber attacks provide plausible deniability to state-sponsored groups.

2016-09-01

Anatomy Of Cyber Jihad

Islamic State already has the motive, means, and opportunity to acquire the personnel & code necessary to launch devastating cyber attacks.

2016-09-01

Europol Warn Of The Ransomware Threat

Europol has joined forces with cyber security companies to launch a worldwide initiative to tackle Ransomware used by cyber criminals.

2016-08-31

Russian State Agencies Infected With Spyware

While US security experts suspect Russian interference with the presidential campaign, the Russian Government is under attack.

2016-08-31

Humans And The Robotic Future

Imagine a world where where nearly every online interaction takes place with a Siri, Alexa, Cortana or some soon-to-be-named artificial being.

2016-08-31

Edward Snowden Proposes Smartphone Privacy

Russia-based privacy advocate Edward Snowden has proposed a device that will inform users when their phones are disclosing their location.

2016-08-31

Psychological Warfare On Social Media

Twittersphere: Cyberwar between India and Kashmiri insurgents is hotting up with a big PsyOps element, focused on social media.

2016-08-30

Enabling Computer Super Intelligence

ARM is designing a semiconductor chip on which the number of transistors is projected to exceed the number of cells in a human brain.

2016-08-30

US Police Use Pokémon Go To Lure Criminals

There can’t be any doubts now of Pokémon Go’s world domination – even the police are getting in on the action.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Sapphire

Sapphire

Sapphire deliver flexible and scalable cybersecurity solutions, helping organisations to detect, protect, respond and remediate against cyber threats.

The Josef Group (TJG)

The Josef Group (TJG)

The Josef Group Inc. is a certified woman-owned permanent staffing agency specializing in Information Technology, Engineering, and US Government "cleared" IT candidates.

Cyberwrite

Cyberwrite

Cyberwrite was founded to provide underwriters around the world a unique and innovative Cyber Underwriting platform.

RedLock

RedLock

The RedLock Cloud 360TM platform correlates disparate security data sets to provide a unified view of risks across fragmented cloud environments.

Acalvio Technologies

Acalvio Technologies

Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter.

ReSec Technologies

ReSec Technologies

ReSec provides total protection against all types of known and unknown malware threats including viruses, Trojans, ransomware and phishing, regardless of their delivery method.

AVORD

AVORD

AVORD is a cloud-based security testing platform that allows clients to manage security testing requirements in a far more productive and efficient way.

Cybertonica

Cybertonica

Cybertonica is a FinTech company which detects and prevents fraudulent transactions and reduces risk for financial services organisations.

Innovation Cybersecurity Ecosystem at BLOCK71 (ICE71)

Innovation Cybersecurity Ecosystem at BLOCK71 (ICE71)

Innovation Cybersecurity Ecosystem at BLOCK71 (ICE71) is Singapore's first cybersecurity entrepreneur hub.

CONCORDIA

CONCORDIA

Concordia is a Cybersecurity Competence Network with leading research, technology, and competences to build the European Secure, Resilient and Trusted Ecosystem.

ACET Solutions

ACET Solutions

ACET Solutions delivers a wide range of Automation, Cyber Security and Enterprise IT/OT Integration Solutions to industrial clients.

River Loop Security

River Loop Security

River Loop Security specialize in solving complex cybersecurity challenges in the IoT and embedded devices space.

CyberRisk Alliance (CRA)

CyberRisk Alliance (CRA)

CyberRisk Alliance is a business intelligence company created to serve the rapidly evolving cybersecurity and information risk management marketplace.

Symmetry Systems

Symmetry Systems

Symmetry Systems is a provider of data store and object-level security (DSOS) solutions that give organizations visibility into, and unified access control of, their most valuable data assets.

Xscale Accelerator

Xscale Accelerator

Xscale's vision is to create world-class startups out of India by transforming sales and providing access to global markets.

Dapple Security

Dapple Security

Dapple Security is creating cutting edge technology utilizing responsible biometrics that protects people and privacy through a first-of-its-kind passwordless platform.