News

2022-09-27

Securing The Future Of Open Finance

Financial-Grade Security: The adoption of Open Banking raises critical cyber security concerns over outdated systems. By Jacob Ideskog

2022-09-27

Many Cyber Security Experts Don’t Understand The Systems They Are Trying To Secure

Square Peg In A Round Hole: The operating technology behind Industrial Control Systems & devices is a mystery to IT professionals. By Joe Weiss 

2022-09-23

Quantum Computing Raises As Many Problems As It Solves

Quantum computing poses both opportunities and risks to the cyber security environment and above all, a serious threat to encrypted communications.

2022-09-22

Even Air-Gapped Computers Are Vulnerable To Attack

LaserShark: Computer systems that are physically isolated from the outside world (air-gapped) can still be attacked via optical channels.

2022-09-22

Artificial Intelligence Distorts Government Decision-Making

AI reinforces the divisions of democracy and might also confound autocratic regimes, by concealing underlying social splits with false consensus.

2022-09-21

Why Domain Protection Is A Key Pillar Of Cybersecurity

Protecting Domain Names Is Vitally Important: Homograph 'look alike' attacks are one of the major challenges in cyber security. By Brian Lonergan

2022-09-21

DARPA Wants To Play With Artificial Intelligence

Gamebreaker: DARPA wants to apply AI to existing real-time conflict strategy games to exploit every hidden and unfair advantage available.

2022-09-21

NATO Secret Missile Data Found On The Dark Web

Failed Ransom Attack: Missile maker says the stolen data was acquired from a compromised external hard drive, rather than a network breach.

2022-09-20

Dutch Town Sues Twitter For Paedophile Conspiracy

False Witness: A small Dutch town is suing Twitter over a conspiracy theory claiming it was once home to a ring of Satanic paedophiles.

2022-09-21

The Hacking Of Hospitals Highlights Ransomware

Ransomware attacks on healthcare organisations are increasing and more needs to be done to update and improve their cyber security.

2022-09-16

Cyber Training And The Skills Shortage

The cybersecurity skills gap is still a significant worry for C-level executives and is moving up the board's priority list. By Nisha Nemasing Rathod

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cybsecurity Foundation (CSF)

Cybsecurity Foundation (CSF)

Cybsecurity is a non-profit NGO, which aims to work on improvement of security levels in the Polish cyberspace.

DCL Search & Select

DCL Search & Select

DCL Search & Selection connect candidates to the best companies in the IT Security, Telco, UC, Outsourcing, ERP, Audit & Control markets.

QATestLab

QATestLab

QATestLab is a leading International software testing company offering a full range of software testing services including security testing.

Herjavec Group

Herjavec Group

Herjavec Group's Managed Security Services practice defends your organization from increasingly sophisticated, targeted cybercrime threats.

Texplained

Texplained

Texplained specializes in security audits of microchips to identify vulnerabilities and protect against invasive cyber attacks.

ThreatMark

ThreatMark

ThreatMark provides fraud detection solutions for digital banking and payments.

National Cyber Security Agency (NACSA) - Malaysia

National Cyber Security Agency (NACSA) - Malaysia

NACSA is the leading government agency in Malaysia responsible for the development and implementation of national cyber security management policie and strategies.

TES

TES

TES is a provider of IT Lifecycle Services, offering bespoke solutions that help customers manage the commissioning, deployment and retirement of Information Technology assets.

EMnify

EMnify

EMnify is a Software-as-a-Service (SaaS) company, revolutionizing cellular Internet of Things (IoT).

Neovera

Neovera

Neovera is a trusted provider of managed services including cyber security and enterprise cloud solutions, committed to delivering results through the innovative use of scalable enterprise-grade tech.

Mitnick Security

Mitnick Security

Mitnick Security is a leading global provider of information security consulting and training services.

White Tuque

White Tuque

A new way to protect your organization. White Tuque is your partner in identifying threats, understanding your risk, and ensuring your business remains resilient.

J.S. Held

J.S. Held

J.S. Held is a global consulting firm providing technical, scientific, and financial expertise across all assets and value at risk.

StealthPath

StealthPath

StealthPath is focused on endpoint protection, securing the “implicit trust” vulnerabilities of current leading information security solutions.

Agile Defense

Agile Defense

Agile Defense is an Information Technology services provider, delivering leading-edge Digital Transformation solutions to the Federal Government.

Infratech

Infratech

Infratech is a leading Saudi company providing cutting-edge services and solutions in IT Infrastructure, IT Security and Digital Transformation.