FREE TO VIEW


« Back to News

2016-07-13

Air Gapping Critical Process Control Networks

Oil giant Chevron has chosen to air gap critical systems to disconnect them from the Internet as much as possible.

2016-07-15

Your Server Has Been Hacked… What Next?

Online criminals trawl the net looking for vulnerable servers. The long-term the chances of an Internet-facing server being hacked approach certainty.

2016-07-14

Bank of England: Cyberattacks A 'Clear and Present Danger'

The Bank of England’s CISO says cyber-attacks are an ongoing danger for firms and building defenses is not just a technical issue.

2016-07-13

Global 'Terror Database' Leaked

The "terrorist database" World-Check used by global banks and intelligence agencies has been leaked.

2016-04-28

Cities Face Multiple Security Threats

City planners must defend against multiple types of security threats, both man-made and natural, physical and virtual.

2016-07-14

Pentagon Unprepared to Repel Cyber Attacks

The Pentagon's new Cyber Command has carried out it's first defensive exercise to repel a simulated attack on US infrastructure.

2016-07-13

Companies Should Tackle Cybercrime & 'take the fight to the criminals'

Today’s cybercriminal often works for complex operations akin to businesses, with HR resources and R&D budgets.

2016-07-12

EU Signs Cyber-Security Agreement With Industry

The EU Commission has launched a public-private partnership on cybersecurity expected to trigger €1.8 Billion of investment by 2020.

2016-07-12

Darktrace Cybersecurity Raises New Funding

Darktrace, a UK based cybersecurity startup that uses artificial intelligence to detect threats gets $65m new investment.

2016-07-12

BMW, Intel and Mobileye Developing Self-Driving Cars

Car manufacturer joins forces with US computer chip giant and Israeli technology firm to bring fully automated driving into production by 2021.

2016-07-18

The Global War of Narratives and the Role of Social Media

The unique characteristic of social media is that it empowers and enables individuals to engage in ways previously unseen. Opinion by Anja Kaspersen.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Global Secure Solutions (GSS)

Global Secure Solutions (GSS)

Global Secure Solutions is an IT security and risk consulting firm and authorised ISO training partner for the PECB.

ShmooCon

ShmooCon

ShmooCon is an annual east coast hacker convention offering three days of demonstrations and discussions of critical infosec issues.

SAS Institute

SAS Institute

SAS is a leader in business analytics software and services providing solutions for a wide range of critical business areas including risk management, compliance and fraud prevention.

vdiscovery

vdiscovery

vdiscovery is a provider of proprietary and best-in-breed solutions in computer forensics, document review, and electronic discovery.

National Health Care Anti-Fraud Association (NHCAA)

National Health Care Anti-Fraud Association (NHCAA)

National Health Care Anti-Fraud Association is the leading national organization focused exclusively on the fight against health care fraud.

Digital Fingerprints

Digital Fingerprints

Digital Fingerprints provides continuous authentication with behavioural biometrics. Protection against account takeover and session takeover. Compliant with GDPR and PSD2.

OffSec

OffSec

OffSec have defined the standard of excellence in penetration testing training. Elite security instructors teach our intense training scenarios and exceptional course material.

GBT Technologies

GBT Technologies

GBT Technologies is a technology company focused on chip design and software to enable IoT, global mesh networks, and for applications relating to artificial intelligence.

Stratum Security

Stratum Security

Stratum Security is an information security consulting company that focuses on providing clear and concise risk guidance to its clients through high quality assessment services.

Onevinn

Onevinn

Onevinn's goal is to create a transparent, cost-effective security that is noticed as little as possible by the users. We simply call it "intelligent security."

CyberSafe

CyberSafe

CyberSafe is a Portuguese company with a focus on cybersecurity solutions and services including network security, managed security, incident response and forensic analysis.

Conquest Cyber

Conquest Cyber

Conquest Cyber builds adaptive risk management programs where innovation is most needed – within defense, intelligence, federal civilian agencies and the industrial base that supports them.

Prevasio

Prevasio

Prevasio is a next-gen Cloud Security Posture Management (CSPM) with a built-in Vulnerability and Anti-Malware Scan for Containers.

Tech Vedika

Tech Vedika

Tech Vedika has access to technical guidance, training and resources from AWS to successfully undertake solution architecture, application development, application migration, and managed services.

ShellBoxes

ShellBoxes

ShellBoxes are a leading Web3 company focused on providing top-notch blockchain security and development services.

Cysurance

Cysurance

Cysurance is a next-generation risk mitigation company that insures, warranties and certifies security solutions.