News

2019-05-29

Is The US Planning A Cyber Attack On Iran?

A pre-emptive cyber-attack could be be a way for the US to hit Iran, without the need for attacks using conventional forces.

2019-06-06

Cyber Command Knows Its Tools Can Also Be Used By Their Targets

US Cyber Command leaders understand that the cyber weapons that they have made to attack their enemies might also be turned against them.

2019-06-06

Two Years After WannaCry Severe Risks Remain

A single vulnerable and an internet-exposed system was enough to wreak havoc, yet with over a million devices still unpatched, the risks remain.

2019-06-05

Digital Advertising Is A $Billion Ripoff

Internet advertising revenues are booming, worth over $100 billion in the US alone, but lying behind this is a hotbed of malware and fraud.

2019-06-05

A Predictive Tool For Armed Police

Police will soon be able to use behavioral data and get warning signs that an armed police officer may be about to go off the rails.

2019-06-04

US Army Identifies How To Improve Cybersecurity

US Army researchers have developed a tool that limits damage caused by malicious traffic, cutting it off after a given number of messages are sent.

2019-05-30

WannaCry Hero Deserves a Pardon, Not A Conviction

Marcus Hutchins, the so-called 'Wannacry Hero' faces up 10 years in prison but could receive a more lenient sentence for accepting responsibility.

2019-05-29

The US Can't Stop China Copying Its Cyber Weapons

China is copying the malware that the NSA developed to use against them. Is this preventable or is it an inherent weakness of cyber warfare?

2019-06-04

US Campaigners Get Trained About Cyber Threats

Have the US political parties learned from the events of 2016? This is a critical question as the 2020 Presidential election draws nearer.

2019-06-03

The Pentagon Has A Clear View Of Cyberwar

US Cyber Command’s first dedicated facility takes an holistic view of the global cyber environment to help make more informed military decisions.

2019-06-03

Google Plan To Use Drone Delivery In Australia

Google's 'Project Wing' drone delivery business has been granted approval to take to the skies over the Australian capital of Canberra.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CyberPolicy

CyberPolicy

CyberPolicy is a cyber protection solution for small businesses. It combines three important components against cyber threats - Cyber Plan, Cybersecurity and Cyber Insurance.

Lockton

Lockton

Lockton is the world’s largest privately owned insurance brokerage firm. Commercial services include Cyber Risk insurance.

Leviathan Security Group

Leviathan Security Group

Leviathan provides a broad set of information security services ranging from low-level technical engineering to strategic business consulting.

PartnerRe

PartnerRe

PartnerRe Ltd. provides multi-line reinsurance to insurance companies on a worldwide basis. Services include Cyber Risk.

CyberSec.sk

CyberSec.sk

CyberSec.sk is the Slovak portal bringing the latest cyber security news, politics, tips and instructions on how to protect the internet.

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER)

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER)

The Office of Cybersecurity, Energy Security, and Emergency Response (CESER) addresses the emerging threats of tomorrow while protecting the reliable flow of energy to Americans today.

Meiya Pico Information Co

Meiya Pico Information Co

Meiya Pico is the leading digital forensics and information security products and service provider in China.

Matrix42

Matrix42

Matrix42 software for digital workspace experience manages devices, applications, processes and services simple, secure and compliant.

Fyde

Fyde

Fyde helps companies with an increasingly distributed workforce mitigate breach risk by enabling secure access to critical enterprise resources.

Zighra

Zighra

Zighra is a leading provider of On-Device AI solutions for continuous authentication and fraud detection on mobile and web applications.

S2T

S2T

S2T builds cyber intelligence solutions based on deep expertise in diverse domains such as intelligence, machine learning and AI, big data processing, statistics and linguistics.

YL Ventures

YL Ventures

YL Ventures funds and supports brilliant Israeli tech entrepreneurs from seed to lead.

Visible Statement

Visible Statement

Visible Statement is a computer-based delivery system designed to insure the retention and recall of your most important security training messages.

SHe CISO Exec

SHe CISO Exec

SHe CISO Exec is a sustainable global training and mentoring platform in information security and leadership.

Trellix

Trellix

Trellix is an extended detection and response (XDR) solutions provider created from a merger of McAfee Enterprise and FireEye Products.

Arcanna.ai

Arcanna.ai

Using a wide range of out-of-the box integrations, Arcanna.ai continuously learns from existing enterprise cybersecurity experts and scales your team’s capacity to deal with threats.

Aite-Novarica Group

Aite-Novarica Group

Aite-Novarica's Cybersecurity practice provides ongoing research and advisory services to chief information security officers focused on protecting their companies’ assets.

LOCH Technologies

LOCH Technologies

LOCH Wireless Machine Vision platform delivers next generation cybersecurity, performance monitoring, and cost management for all 5G and for broad-spectrum IoT, IoMT and OT wireless environments.