News

2019-08-23

What’s On The Dark Web?

The normal web is just a small part of the Internet. Using Tor, you can get access, but what are the issues around visiting the Dark Web?

2019-08-21

Pakistan Clashes With India In Cyberspace

Pakistan has unleashed a social media campaign to promote anti-India propaganda following a disagreement over the region of Kashmir.

2019-08-21

Over 60% of Enterprises Fail to Build Effective Cloud Security

Over half of organisations are using cybersecurity methods that fail to keep pace with the changes and up-grades that their cloud security requires.

2019-08-21

Cyberwar Between Nation-States Damages Business

Businesses are at risk of becoming “collateral damage” in nation-state cyber conflicts and need to be protected in a fundamentally new way.

2019-08-20

Home Working Can Often Be A Security Threat

The security lapses employees may make when working from remote locations represent one of the largest cybersecurity threats to business.

2019-08-20

Connected Cars Are The New Attack Vector

Hacking some smart devices might lead to nothing more than an invasion of privacy. Hacks of connected cars could be used for lethal purposes.

2019-08-20

Foreign Cyber Intrusions On The USA

It’s not just happening on Election Day. Foreign governments are using social media to insert themselves into US politics “every single day'.

2019-08-19

Cyber Security: A Guide For Education Providers

Firewalls, data back-ups, staff training and email verification are just some of the actions colleges should take to protect themselves against attacks.

2019-08-19

Transforming A Business The Data Driven Way

Reading List: A manual for newly-appointed data leaders in companies that are planning to start on a journey of data transformation.

2019-08-19

The Global Cyber Skills & Training Shortage

Skilled cybersecurity professionals are key, but there are just not enough of them and there is an anticipated shortage of 1.8m workers by 2022.

2019-08-19

US Releases Malware Linked To N. Korean Hacking Group

Electric Fish: US Cyber Command has released samples of malware that they say are linked to N. Korean hackers from the Lazarus Group.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Lockton

Lockton

Lockton is the world’s largest privately owned insurance brokerage firm. Commercial services include Cyber Risk insurance.

Redicom

Redicom

Redicom is an independent consulting agency focusing on identity management, strong authentication and single-sign-on.

Idaho National Laboratory (INL)

Idaho National Laboratory (INL)

INL is an applied engineering laboratory dedicated to supporting the US Dept of Energy's missions in energy research, nuclear science and national defense including critical infrastructure protection.

AVeS Cyber Security

AVeS Cyber Security

AVeS combines expert knowledge and services with leading technology products to provide comprehensive Information Security and Advanced IT Infrastructure solutions.

Zeguro

Zeguro

Zeguro provides complete cybersecurity risk assessment, mitigation and insurance, allowing you to easily manage your cyber risk.

Cylus

Cylus

Cylus, a global leader in rail cybersecurity, helps rail and metro companies avoid safety incidents and service disruptions caused by cyber-attacks.

Osirium

Osirium

The Osirium PxM Privileged Access Management platform addresses both security and compliance requirements by defining who gets access to what and when.

Ten Eleven Ventures

Ten Eleven Ventures

Ten Eleven is a specialized venture capital firm exclusively dedicated to helping cybersecurity companies thrive.

Finnish Security & Intelligence Service (SUPO)

Finnish Security & Intelligence Service (SUPO)

The Finnish Security and Intelligence Service is a government agency tasked with combating serious threats to national security in Finland.

Clear Thinking Solutions

Clear Thinking Solutions

Clear Thinking is an IT Solutions company specialising in secure & compliant technical services.

Def-Logix

Def-Logix

Def-Logix was founded in 2008 to help solve cyber threats being experienced by government agencies of the United States.

Lavabit

Lavabit

Lavabit's Dark Internet Mail Environment is a secure, open-source, secure end-to-end communications platform for asynchronous messaging across the internet.

Persistent Systems

Persistent Systems

Persistent Systems are a trusted Digital Engineering and Enterprise Modernization partner, combining deep technical expertise and industry experience to help our clients.

McAfee

McAfee

McAfee is a worldwide leader in online protection. We’re focused on protecting people, not devices. Our solutions adapt to our customers’ needs and empower them to confidently experience life online.

HADESS

HADESS

We are "Hadess", a group of cyber security experts and white hat hackers.

Centre for Cyber Security Research & Innovation

Centre for Cyber Security Research & Innovation

The Centre for Cyber Security Research & Innovation is Nepal's First Academic Research Institute to focus on understanding the overall Information Security of Nepalese Organizations.