News

2017-07-14

Biometric Products Can Help Cybersecurity

65 percent of large firms in the UK detected a cybersecurity breach or attack in the past year. Adding biometrics to cybersecurity could fix that.

2017-07-14

Who Is Behind Petya?

Petya has several different names, but the experts at ESET say the origins of this destructive ransomware lie in one direction.

2017-07-13

Are Corporate Cyber Defenses Adequate?

It’s not just about the technology: Business leaders should be focusing on their companies’ systemic risks, rather than just software.

2017-07-13

AI For Effective Healthcare Cyber Resilience

Healthcare CISOs should recognise that AI has the ability to enhance the identification of malicious activity and to protect systems and data from attackers.

2017-07-13

Hackers Attempt To Penetrate US Nuclear Plants

The US government is warning industrial firms about hacking activity targeting the nuclear and energy sectors.

2017-07-13

Twitter May Introduce A 'Fake News' Flag

A new feature that would let users flag tweets that are false or inaccurate, in an attempt to combat the spread of disinformation on the platform.

2017-07-12

Australia’s Sharp Turn To Information Warfare

The Australian government responds to regional threats and moves towards the defence concept of 'information dominance'.

2017-07-12

Islamic State On The Internet

Project TENSOR: British police working on improving methods of detecting terrorist content

2017-07-11

Insurance: How Cyber Risks Are Evolving

Lloyds of London say that both the costs and the ways in which companies can be targeted by organised cyber criminals are increasing.

2017-07-11

Self- Drive Vehicle Are Confused by Kangaroos

Volvo's self-drive system can identify and avoid deer, elk and caribou, but testing in Australia shows it cannot adjust to kangaroos.

2017-07-11

Ukrainian Security Call in FBI, NCA & Europol

Ukraine's SBU security service calls in international help & has branded the hugely damaging Petya attack an “act of cyber-terrorism”.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Help Net Security

Help Net Security

Help Net Security has been a prime resource for information security news and insight since 1998.

RedShield Security

RedShield Security

RedShield is the world's first web application shielding-with-a-service company.

ETSI

ETSI

ETSI is a European Standards Organization dealing with telecommunications, broadcasting and other electronic communications networks and services including cybersecurity.

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation (EIF) of Armenia is one of the largest technology business incubators and IT development agencies in the region.

NetApp Excellerator

NetApp Excellerator

NetApp Excellerator is NetApp’s global start-up program that aims to fuel innovation by partnering with deep-tech start-ups.

SecureLogix

SecureLogix

SecureLogix deliver a unified voice network security and call verification solution. Protect against call attacks & fraud.

OWN

OWN

OWN (formerly SEKOIA) is a major French player in cybersecurity providing tailor-made, informed and adapted cyber support thanks to its DNA of passionate and committed experts.

eMazzanti Technologies

eMazzanti Technologies

eMazzanti Technologies provides IT consulting services for businesses ranging from home offices to multinational corporations throughout the USA and internationally.

Symmetry Systems

Symmetry Systems

Symmetry Systems is a provider of data store and object-level security (DSOS) solutions that give organizations visibility into, and unified access control of, their most valuable data assets.

Polestar Industrial IT

Polestar Industrial IT

Polestar work on both sides of the IT & OT divide. Network, Data & Asset Security is our priority. Polestar installations are robust and resilient and comply with the appropriate security.

Cyber Suraksa

Cyber Suraksa

We make security simple and hassle-free by offering a sustained and secure IT environment with next-gen cybersecurity solutions through a scalable security-as-a-service model.

Lodestone

Lodestone

Lodestone partners with clients to help them mitigate business and reputational risk, through our human-based, approach to cyber security, digital forensics and incident response.

Commission Nationale de l'Informatique et des Libertés (CNIL) - France

Commission Nationale de l'Informatique et des Libertés (CNIL) - France

The mission of CNIL is to protect personal data, support innovation, and preserve individual liberties.

Benchmark IT Services (BITS)

Benchmark IT Services (BITS)

BITS is a leading cyber security company in Australia. Our certified professionals work with you to keep your data assets safe and secure.

PDQ

PDQ

PDQ helps IT professionals to manage and organize hardware, software, and configuration data for Windows- and Apple-based devices.

Locket Cybersecurity

Locket Cybersecurity

Locket’s certified students provide pro-bono security audits for small and medium-sized businesses in the Chicagoland area.