News

2018-09-04

Training Young Hackers To Stop Cybercrime

British police chiefs and intelligence officers hope that young people will become their latest recruits in the rapidly evolving cyber war.

2018-09-07

Why Mainframe Security Risks Are Largely Unrecognized

Healthcare records are a top target for hackers, but what about vulnerabilities that aren’t even on the radar of hospital IT departments?

2018-09-07

Organizations Hit With North Korea-Linked Ryuk Ransomware

A recent wave of ransomware attacks against organizations have been linked to a notorious North Korean threat actor.

2018-09-07

Blockchain, Chatbots, AI Could Reinvent Corporate Finance

Traditionally siloed corporate finance operations are beginning to test technologies that can offer a single view of corporate data.

2018-09-07

Hamas Turns To Instagram To Lure IDF Soldiers

New effort uncovered by Hamas to trick soldiers into downloading spyware onto their phones by befriending them on Instagram.

2018-09-05

Trump Relaxes US Cyber Attack Rules

The US administration is under pressure to deal with cyber-threats, amid growing concerns that state-sponsored hacks on critical infrastructure.

2018-09-05

How Blockchain Can Protect IoT Devices

IoT devices which are online all the time are especially vulnerable to cyberattack and could even be part of one. Blockchain can mitigate that.

2018-09-05

US Army Upgrades Cyber Protection Training

The US Army's cyber protection teams are upgrading their training program to include a real-life, round-the-clock, cyberattack on a city port.

2018-09-04

NATO Live-Fire Cyber Exercise

Locked Shields: With the cyber domain playing host to increased hostilities, NATO's readiness for attacks has never been more crucial.

2018-09-04

Cyber Insurance Has Distinctly Risky Characteristics

The danger of accumulation of cyber risks is a key concern for the insurance market, according to a study released by The Geneva Association.

2018-08-23

Catching The Silent Attacker, And The Next Phase Of Cyber AI

Lurking beneath the surface of enterprises today are subtle, stealthy cyber-threats – how can cyber AI fight back?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ACME Communications

ACME Communications

ACME Communications specialises in the field of data centre, implementation, maintenance & operation and all aspects of other IT service.

AET Europe

AET Europe

AET Europe is specialised in creating technological solutions for user identification and authentication.

ZyberSafe

ZyberSafe

ZyberSafe is an innovative Danish company specialized within building hardware encryption solutions.

Positive Technologies

Positive Technologies

Positive Technologies is a leading global provider of enterprise security solutions for vulnerability and compliance management, incident and threat analysis, and application protection.

CalCom

CalCom

CalCom Hardening Solution (CHS) for Microsoft OMS is a security baseline-hardening solution designed to address the needs of IT operations and security teams.

IPN (ICT Research Platform Nederlands)

IPN (ICT Research Platform Nederlands)

IPN promotes academic research and education in the ICT field by building and maintaining a national community, and by developing policy to advance the field. Areas of focus include Cyber Security.

H-11 Digital Forensics

H-11 Digital Forensics

H-11 Digital Forensics is a global leader of digital forensic technology.

Global Lifecycle Solutions EMEA (Global EMEA)

Global Lifecycle Solutions EMEA (Global EMEA)

Global EMEA provides full lifecycle services to corporate Clients covering procurement, configuration, support, maintenance and end-of-life asset management.

Nominet

Nominet

Nominet's cyber division offers network detection and response services to governments and enterprises worldwide.

Rhino Security Labs

Rhino Security Labs

Rhino Security Labs is a top penetration testing and security assessment firm, with a focus on cloud pentesting, network pentesting, web application pentesting, and phishing.

GateKeeper Enterprise

GateKeeper Enterprise

The GateKeeper Enterprise software is an identity access management solution. Automated proximity-based authentication into computers and websites. Passwordless login and auto-lock PCs.

Stronger International

Stronger International

Stronger International provides expert cyber services and training to organizations and individuals to enhance IT and security knowledge.

Cybaverse

Cybaverse

Cybaverse (formerly North Star Cyber Security) was founded to create the perfect blend of a Managed Security Service Provider (MSSP) and a Cyber Security Consultancy in one.

Zeva

Zeva

Zeva solves complex identity and encryption challenges for the federal government and corporations around the globe.

Winmill Software

Winmill Software

Winmill is a technology services company that provides expert consulting services in Application Development, Application Security and Cyber Security.

ArmorPoint

ArmorPoint

ArmorPoint redefines the traditional approach to cybersecurity by combining network operations, security operations, and SIEM technology in one platform.