News

2016-02-23

Data Security – The Trends We Do Not See Coming

With the emergence of the Internet of Things (IoT) and the Cloud the security industry is going through a time of challenge and re-invention.

2016-02-22

Women Write Better Computer Code Than Men

Computer code written by women has a higher approval rating than that written by men - but only if their gender is not identifiable.

2016-02-22

Clinton Calls Cybersecurity ‘One of the Most Important Challenges’ for the Next U.S. President

Hillary Clinton’s private server is currently in the possession of the FBI and she is under investigation over misusing classified information.

2016-02-22

Anonymous Hacks Thai and Turkey Police Stations

Anonymous hacktivists are trying to take justice into their own hands by direct action against Police & Security Services websites.

2016-02-19

NSA AI Technology May Have Targeted Innocents

The NSA has been using a machine-learning program to identify & target terrorists with deadly force, but its methodology may have been wrong.

2016-02-25

Nitro Zeus: The US Plan To Launch A Massive Cyber Attack On Iran

An elaborate plan for a cyberattack on Iran in case the diplomatic effort to limit its nuclear program failed and led to a military conflict.

2016-02-17

Banks Must React To FinTech

The financial sector is starting to innovate alongside the rest of the business world in response to emerging FinTech (Financial Technology).

2016-02-19

Brace Yourself For A Cyber-Tsunami

The power of technology to reshape the world is reaching historic levels.

2016-02-17

MIT Develops A Hack-Proof RFID Chip

Do you know about RFID chips and how many you are carrying at this moment? What actually is an RFID chip?

2016-02-17

Barely A Third of Energy Companies Track Cyber Threats

The energy sector faces more cyber attacks than any other industry, and attacks on industrial control system networks are on the rise.

2016-02-19

What Motivates Cyber Criminals?

Most hackers are driven by financial gain, but it turns out the Big Payday is a myth. How much do they really make from crime?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cifas

Cifas

Cifas are leaders in fraud prevention, working closely with UK law enforcement partners.

Experian

Experian

Experian provide software solutions to help organizations prevent identity fraud and crime.

Attivo Networks

Attivo Networks

Attivo Networks is an award winning provider of deception for in-network threat detection, attack forensic analysis, and continuous threat response.

Telesoft Technologies

Telesoft Technologies

Telesoft Technologies is a global provider of cyber security, telecom and government infrastructure products and services.

DirectDefense

DirectDefense

DirectDefense is an information security services and managed services provider.

FoxGuard Solutions

FoxGuard Solutions

FoxGuard Solutions develops customized cyber security, compliance and industrial computing solutions for critical infrastructure entities and control system vendors.

Securicon

Securicon

Securicon provides expert consulting for application, system and network security.

Global Security Network (GSN)

Global Security Network (GSN)

GSN focuses on specialized IT Security solutions & services for the military, law enforcement, critical infrastructure and oil & gas sectors in the Middle East.

California Cybersecurity Institute (CCI) - Cal poly

California Cybersecurity Institute (CCI) - Cal poly

The CCI provides a hands-on research and learning environment to explore new cyber technologies and train and test tactics alongside law enforcement and cyberforensics experts.

SmartContractAudits.com

SmartContractAudits.com

SmartContractAudits.com is the leading platform for finding companies providing smart contract auditing services.

Smart Contract Security Alliance

Smart Contract Security Alliance

The Smart Contract Security Alliance supports the blockchain ecosystem by building standards for smart contract security and smart contract audits.

Casque SNR

Casque SNR

CASQUE SNR is the next generation of Identity Assurance that has potential to supersede existing solutions. It provides Identity Assurance for both people and things.

FirstWave Cloud Technology

FirstWave Cloud Technology

FirstWave Cloud Technology is a global cyber security company which has been delivering Cybersecurity-as-a-service solutions to the market since 2004.

Infinavate

Infinavate

Infinavate Fort CyberVault offers end-to-end services that comprehensively responds to the organization’s information security and privacy needs.

BetterWorld Technology

BetterWorld Technology

BetterWorld Technology provides cloud solutions, managed services, SaaS, cybersecurity and virtual CIO, all customized to meet your needs.

Options Technology

Options Technology

Options is a global leader in financial technology, specialising in Capital Markets technology and enterprise-grade solutions.