FREE TO VIEW


« Back to News

2015-12-02

Anonymous’ Cyberwar With ISIS And It’s Unintended Consequences.

Efforts to take down ISIS Web sites may have unintended security consequences for carefully planned law enforcement operations.

2015-12-02

Bitwalking: Digital Currency Pays People to Walk

Bitwalking dollars will be earned by walking, unlike other digital currencies such as Bitcoins that are "mined" by computers.

2015-12-02

Coinbase Shift Payments To Bitcoin Debit Card

A debit card integrating all your currencies, both real and virtual, together in one payment source.

2015-12-02

Cyber Security Firm Tanium Raises New Capital At $2.5billion Valuation

Investors see that what makes Tanium unique is its ability to detect and fix enterprise security threats quickly.

2015-12-04

Russian Financial Cybercrime

Russian cyber criminals have evolved and gained a reputation for sophisticated financial crime; it's top flight are believed to have stolen over $790m.

2015-12-02

Cyber Threat From Within

A rogue employee can do at least as much damage as a rogue nation.

2015-12-01

The Road to Measuring and Interpreting Big Data

Think tank Demos and market research firm Ipos MORI are taking a close look at social media using big data analytic methods.

2015-12-01

Former NSA Expert ‘We are in the Cyber War’

Security mechanisms cannot keep up with the threats that both state actors and non-state actors like Anonymous are producing.

2015-12-01

Presidential Candidate John McAfee Talks Cyber

When it comes to eccentric personalities and colorful pasts, Donald Trump has nothing on John McAfee.

2015-12-01

IoT Attacks and Evasion Will Characterize 2016

The Internet of Things along with predictions of new malicious tactics & strategies will create unique challenges in 2016.

2015-12-05

IBM's CEO On Hackers: 'Cyber Crime Is The Greatest Threat To Every Company In The World'

"... cyber crime, by definition, is the greatest threat to every profession, every industry, every company in the world.”

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

eSentire

eSentire

eSentire is the authority in Managed Detection and Response Services, protecting the critical data and applications of organizations from known and unknown cyber threats.

CERT.lu

CERT.lu

CERT.lu is an initiative to enhance cyber security practices and techniques, and support security professionals in Luxembourg.

Synelixis Solutions

Synelixis Solutions

Synelixis Solutions is a high-tech company founded to provide complete telecommunications, networking, security, control and automation solutions.

Garland Technology

Garland Technology

Garland Technology specializes in network access points (TAPs) for 100% visibility allowing you to see every bit, byte, and packet flowing through your network.

Naukrigulf

Naukrigulf

Naukrigulf.com is one of the fastest growing job sites in the Gulf, with thousands of registered job seekers and a robust CV database across many sectors, including cybersecurity.

M2SYS

M2SYS

M2SYS is a worldwide leader in identification and authentication solutions.

SAP National Security Services (NS2)

SAP National Security Services (NS2)

SAP NS2 are dedicated to delivering the best of SAP innovation, from cloud to predictive analytics; machine learning to data fusion.

Elpha Secure

Elpha Secure

Elpha Secure provides a comprehensive cybersecurity solution, combining technology and insurance to protect against cyber threats.

Berezha Security Group (BSG)

Berezha Security Group (BSG)

BSG is a cybersecurity consulting firm specializing in all aspects of application security and penetration testing.

Wickr

Wickr

Wickr's mission is to secure the world's most critical communications. Wickr provides the highest standard of encryption trusted by millions worldwide.

Phished

Phished

Phished is an AI-driven platform that focuses on the human side of cybersecurity. By combining fully automated training software with personalised, realistic simulations of cyberattacks.

Drawbridge

Drawbridge

Drawbridge is a premier provider of cybersecurity software and solutions to the alternative investment industry.

CYDEF

CYDEF

CYDEF provides comprehensive, state-of-the-art cybersecurity protection that is accessible and affordable to organizations of any size.

Nanitor

Nanitor

Nanitor is a powerful cybersecurity management platform focusing on hardening security fundamentals across your global IT infrastructure.

European Union Agency for Network and Information Security (ENISA)

European Union Agency for Network and Information Security (ENISA)

The European Union Agency for Cybersecurity, ENISA, is the Union’s agency dedicated to achieving a high common level of cybersecurity across Europe.

Flawnter

Flawnter

Flawnter is a security testing software that finds hidden security and quality flaws in your applications.