News

2017-03-25

UK Accused Of 'full-frontal attack' On Whistleblowers

The British government’s legal advisers have been accused of launching a “full-frontal attack” on whistleblowers in the propssed Espionage Act

2017-03-20

Law to Imprison Journalists for Publishing Leaks

Espionage Act: A new law designed to tackle international espionage could be used to imprison British journalists who obtain leaked material.

2017-02-21

Privacy Groups say FBI Hacking went too Far!

Privacy advocates are claiming in court that an FBI hacking operation to take down a child pornography site was unconstitutional and violated international law.

2017-03-22

Handbook Of Russian Information Warfare

NATO just published a new guide to Russian capabilities and intentions for combined information & cyber warfare.

2017-03-24

Snowden Says Report Proves He’s Not A Spy

Edward Snowden says reports that Russia might deport him to the US as a “gift” to Donald Trump vindicate him of charges that he is a spy.

2017-02-21

Global Banks Hit by Watering Hole Blitz

Over 100 organisations worldwide have been hit by a major new coordinated campaign using compromised websites to infect them with malware linked to the infamous Lazarus Group, according to Symantec.

2017-02-20

UK Under Attack By Russian & Chinese State Sponsored Hackers

GCHQ say that Britain is being hit by dozens of cyber-attacks a month, including attempts to steal defence and foreign policy secrets.

2017-02-17

Technology, Multilateralism, War and Peace

Wars are no longer only about combatants and tanks, but also about algorithms and bots. Opinion by Anje Kasperesen

2017-02-18

WhatsApp Becomes The Latest Victim

Is there a truly secure messaging app? Attackers could exploit a security vulnerability in WhatsApp to snoop on its users.

2017-02-20

How To Automate Cyber Defense

Humans aren’t fast enough to respond to network attacks and breaches. Machines can help us, if we help them.

2017-02-20

Deterrence & Cyber Attacks On The US Electoral System

Deterring future cyber-meddling in US elections will require convincing adversaries that the response will be painful & their efforts ineffective.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Rackspace Technology

Rackspace Technology

Rackspace Technology is a leading provider of managed services across all major public and private cloud technologies. Secure your IT environments with powerful cloud security solutions and support.

CSR Privacy Solutions

CSR Privacy Solutions

CSR Privacy Solutions is a leading provider of privacy regulatory compliance programs for small and medium sized businesses.

HDI Global SE

HDI Global SE

HDI Global SE provides customised insurance solutions for industrial and commercial clients worldwide including Cyber Liability insurance.

MaskTech

MaskTech

MaskTech supplies highest security embedded chipsets, operating systems and related middleware for electronic identification cards, travel documents and authentication solutions.

TUV Rheinland Group

TUV Rheinland Group

TUV Rheinland Group is a testing services company with nearly 145 years of technological experience. We help you to protect your systems comprehensively, proactively and permanently.

Acuant

Acuant

Acuant is a leading global provider of identity verification, regulatory compliance (AML/KYC) and digital identity solutions.

Shift5

Shift5

Shift5 focus on securing operational technology (OT) by building best-in-class, dual-use products serving military and commercial entities.

Field Effect Software

Field Effect Software

Field Effect Software build sophisticated and integrated IT security, threat surface reduction, training and simulation capabilities for enterprises and small businesses.

CYRISMA

CYRISMA

CYRISMA is a revolutionary cybersecurity platform that helps organizations manage risk without the usual headaches associated with enterprise cybersecurity tools.

Cyber Security Operations Consulting (CyberSecOp)

Cyber Security Operations Consulting (CyberSecOp)

CyberSecOp is an ISO 27001 Certified Organization which provides cyber security operations services and risk management consulting.

SignalSEC

SignalSEC

SignalSEC provides vulnerability intelligence, malware analysis, penetration testing and associated training services.

tru.ID

tru.ID

We’re tru.ID, and we're reimagining mobile authentication, one API at a time.

Testhouse Ltd

Testhouse Ltd

Testhouse is a thought leader in the Quality Assurance, software testing and DevOps space. Founded in the year 2000 in London, UK, with a mission to contribute towards a world of high-quality software

Wib

Wib

Wib is an API security leader. We are the only company providing a solution for the entire API development lifecycle.

ShieldIO

ShieldIO

ShieldIO Real-Time Homomorphic Encryption™ enables your organization to reach regulatory compliance without compromising data availability.

Cyber Security Global

Cyber Security Global

Cyber Security Global is a leader in electronic security, consultancy, technology, cybersecurity solutions, training, and specialized products.

CESAR

CESAR

CESAR is one of the premier R+D and innovation centers in Brazil and a designated Cybersecurity Competence Center.