News

2020-02-10

Attack Vectors Are Proliferating

The range of threat vectors is growing fast and inceasing connectivity broadens the potential attack surface, for everone and everything.

2020-02-10

Spies Really Like Artificial Intelligence

AI is helping US spy agencies reach analytical conclusions with instantaneous machine translation, speech recognition and data collection.

2020-02-10

Fake News Uses Coronavirus To Spread Malware

Cybercriminals are using fake email messages about coronavirus Covid-19 to spread the destructive Emotet Trojan, along with other malware.

2020-02-10

Big Cyber Attack Hits Iran

Digital Fortress: Internet connectivity in Iran dropped to 75% after a 'powerful' DDoS attack that targeted Iran's telecom services this weekend.

2020-02-10

The Geopolitics Of Cybersecurity

Reading List: The technological transformation emerging from cyberspace is like nothing else before. Dr. Jayshree Pandya looks at the issues.

2020-02-07

Market Growth Leads To Better Job Opportunities

Cybersecurity firms are having more trouble attracting and keeping skilled workers to help protect networks as the Skills Shortage grows.

2020-02-12

WEBINAR: How To Leverage Endpoint Detection & Response (EDR) In AWS Investigations

Thursday, February 20 | Join SANS & AWS Marketplace to learn about adding EDR features to your Amazon Web Services environment.

2020-02-07

What Is The Fuss About 5G?

The next generation of mobile Internet connection offers much faster data download and upload speeds. But there is more to it than that.

2020-02-06

Leaked Report: The United Nations Was Hacked

Major Meltdown: Hackers invaded the UN’s computer network in Geneva and Vienna in a spying operation that has been kept secret.

2020-02-06

Iowa Election App Vulnerable To Hackers

Experts say the App used to run the Iowa Democrat election was poorly designed with insecure data being sent to unknown destinations.

2020-02-05

Preparing Your Employees & Business Systems For A Cyber Attack

With regular training and a few key process implementations, you can keep your company and your people from becoming a hacking statistic.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NuHarbor Security

NuHarbor Security

NuHarbor is a leading information security consulting and advisory firm specializing in Information Security, Compliance, and Risk Management.

Capita

Capita

Capita is a consulting, digital services and software business, providing end-to-end enterprise IT services and solutions focused around digital transformation and innovation.

Cyber Security & Information Systems Information Analysis Center (CSIAC) - USA

Cyber Security & Information Systems Information Analysis Center (CSIAC) - USA

CSIAC is chartered to leverage best practices and expertise from government, industry, and academia on cyber security and information technology.

National Cyber Summit (NCS)

National Cyber Summit (NCS)

The National Cyber Summit is the preeminent event for cyber training, education and workforce development aimed at protecting our nation's infrastructure from the ever-evolving cyber threat.

Ensurity Technologies

Ensurity Technologies

Ensurity is a deep-tech cybersecurity engineering company; designs and manufactures specialized secure hardware, software, and mobile application solutions.

Kentik

Kentik

Kentik - one platform for Network Visibility, Performance, and Security.

Talion

Talion

Talion aim to reduce the complexity involved in securing your organisation and to give security teams unrivalled visibility into their security operations, so they can make optimal decisions, fast.

IMQ Group

IMQ Group

IMQ is one of Europe’s top players in the field of conformity assessment. We offer certification services to support all the major sectors of the manufacturing and service industries.

NXM Labs

NXM Labs

NXM is a leader in a leader in advanced cybersecurity software for connected devices.

Davinsi Labs

Davinsi Labs

Davinsi Labs helps companies achieve Digital Service Excellence with specialized Security Intelligence and Service Intelligence solutions.

SecurityLoophole

SecurityLoophole

SecurityLoophole is an independent cyber security news platform with global coverage. Latest updates, reports, news and events related to cyber security.

Zluri

Zluri

Zluri is a cloud-native SaaSOps platform enabling modern enterprises with SaaS Management and Identity Governance.

Trium Cyber

Trium Cyber

Trium Cyber - Expert Cyber Underwriting and Claims Management. Based in the US and UK. Backed by Lloyd’s of London.

Canary Technology Solutions (Canary IT)

Canary Technology Solutions (Canary IT)

A Cloud, Cyber Security, Retail Solutions and Managed IT Services provider for over 25 years, we safeguard and revolutionise business through technology and foresight.

Hanwha Systems

Hanwha Systems

Hanwha Systems is a global company based in South Korea providing defense electronics and smart ICT solutions.

Maximus

Maximus

Maximus is a trusted service delivery partner and architect of government technology solutions, we empower communities by ensuring seamless and equitable access to government services.