For continued FREE access to Articles and Directory Listings please Login to your Account or Sign Up.

Subscribe Login

2021-04-20

CYRIN - Where Education Comes to You

Creating Training Options: CYRIN Cyber Range has something new - including over 50 Labs, Exercises, Attacks and Courses to choose from.

2021-04-20

Cyber Threats & Nuclear Dangers

The threat to nuclear weapons systems, materials and facilities which are vulnerable to cyber attacks, sabotage and theft is a serious present danger.

2021-04-20

61% Of Employees Fail A Basic Cyber Security Test

Almost 70% of employees polled in a new survey have had cyber security training, but over sixty percent of them failed a basic cyber security test.

2021-04-20

Microsoft Buys Into AI Speech Regnition

Microsoft is on an agressive growth path with Artificial Intelliegence and will buy speech recognition company, Nuance, for $20 billion.

2021-04-20

Easy-to-Guess Passwords Are Risky

Making It Easy For Thieves: Too many people are using easy-to-guess passwords, including their pet's name, football team or a memorable date.

2021-04-19

Results: NATO’s 2021 Cyber War Game

Locked Shields 2021: The team from Sweden ranked highest at the largest and most complex international live-fire cyber defence exercise.

2021-04-18

Trump's Family Get Blocked On Facebook

Facebook and the other US social media platforms seem ready to make arbitrary decisions on what may, or may not appear on their users' pages.

2021-04-17

Webinar: Building A Security Observability Strategy In AWS

In this webinar, SANS and AWS Marketplace will discuss how to architect a security observability strategy in AWS, with practical guidance and tips.

2021-04-15

Making 2FA More Secure

2FA provides a way of 'double checking' that you really are the person you are claiming to be and new technology applies this to facial movements.

2021-04-15

Cyber Crime in 2021: How Hackers Are Evolving

Cyber criminals have to constantly develop sophisticated attacks to fit new trends while upgrading existing attacks to avoid detection.

Subscribe!

Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

WEBINAR: How To Build A Security Observability Strategy In AWS

WEBINAR: How To Build A Security Observability Strategy In AWS

Thursday, Apr 22, 2021 - Join this webinar to learn how to build a security observability strategy in AWS, covering cloud-native monitoring sources, guardrails, and automation capabilities.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Finjan Mobile

Finjan Mobile

Finjan Mobile deliver security applications for mobile devices to defend against spyware, phishing and malware.

International Association for Cryptologic Research (IACR)

International Association for Cryptologic Research (IACR)

(IACR is a non-profit scientific organization whose purpose is to further research in cryptology and related fields.

Plixer

Plixer

Plixer delivers a network traffic analytics system used for monitoring, visualization, and reporting of network and security incidents.

Wizlynx Group

Wizlynx Group

Wizlynx services cover the entire risk management lifecycle from security assessments and compliance to the implementation of security solutions and provision of Managed Security Services.

SQN Banking Systems

SQN Banking Systems

SQN Banking Systems fraud detection software products are a critical step towards overcoming the growing problem of fraud across the various payment channels.

Radically Open Security

Radically Open Security

Radically Open Security is the world's first not-for-profit computer security consultancy company.

ClassNK Consulting Service (NKCS)

ClassNK Consulting Service (NKCS)

ClassNK Consulting provides consulting services to the maritime industry with a focus on safety, security and compliance.

Cympire

Cympire

Cympire significantly increases an organisation’s Cyber Resilience through continuous Training and Assessment. Cyber Security Training Platform. Cloud-based and fully customizable Cyber Range.