News

2016-01-18

Top 2016 Big Data Challenges: Skills Shortage

In 2016, big data will lend support to almost every function of a business. But there is a huge organisational challenge to staff big data projects.

2016-01-13

Cyber Security In Modern Railways

Railways are part of national critical infrastructure. New research identifies a long list of security issues affecting railroad systems.

2016-01-12

Ukrainian Power Grid Hack

Were Russian government hackers behind a successful cyber attack on the Ukrainian power grid last month?

2016-01-11

TalkTalk Hack Revisted

After the TalkTalk hack, what can be learnt to help other companies prevent a similar situation? Opinion By Max Vetter

2016-01-14

Islamic State Launches A Cyber War Magazine

Islamic State has launched a magazine, 'Kybernetiq' to guide jihadists on how to take part in 'cyber war' including encryption & messaging.

2016-01-12

USA 2016: How Will Snowden Vote?

Edward Snowden is still a US citizen and eligible to vote in the presidential election, even from exile in Russia. Democrat or Republican?

2016-01-14

Britain's Nuclear Subs In Cyber War

Britain's new submarine fleet will be equipped with the latest deadly nuclear missiles. Could they be rendered impotent by cyber warfare?

2016-01-11

Investing In Artificial Intelligence

Artificial intelligence is one of the most exciting and transformative opportunities of our time. Here's why investors are piling in.

2016-01-04

China Passes Controversial Counter-terrorism Law

China passes anti-terrorism laws that requires technology firms to help decrypt information and permits the military to pursue terrorists overseas.

2016-01-09

North Korea's 'Paranoid' Computer Operating System

North Korea’s homegrown computer operating system reportedly mirrors its political one - marked by a high degree of paranoia.

2016-01-18

Fighting Cybercrime As The World Goes Digital

A white knuckle ride: What we can and should be doing to contain the explosion of cybercrime?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Gurucul

Gurucul

Gurucul predictive security analytics protects against insider threats, account compromise and data exfiltration on-premises and in the cloud.

Armadillo Sec

Armadillo Sec

Armadillo provide penetration testing and vulnerability assessment services.

Ivanti

Ivanti

Ivanti provide user-centered IT solutions designed to increase user productivity while reducing IT security risk.

Netresec

Netresec

Netresec is an independent software vendor with focus on the network security field. We specialize in software for network forensics and analysis of network traffic.

Greenwave Systems

Greenwave Systems

Greenwave's AXON Platform enables IoT and M2M network service providers to address security, interoperability, flexibility and scalability from a single IoT platform.

Armis

Armis

Armis offers the markets leading asset intelligence platform designed to address the new threat landscape that connected devices create.

ReFirm Labs

ReFirm Labs

ReFirm Labs provides the tools you need for firmware security, vetting, analysis and continuous IoT security monitoring.

Netsecurity AS

Netsecurity AS

Netsecurity is a Norwegian owned company focused and specialised within IT security and cybersecurity-as-a service.

Institute for Security and Technology (IST)

Institute for Security and Technology (IST)

The Institute for Security and Technology's goal is to provide the tools and insights needed for companies and governments to outpace emerging global security threats.

Amidas Hong Kong

Amidas Hong Kong

Amidas is your trusted companion on the road to Digital Transformation. We provide a full range of Information Technology Solutions and Professional Services to Enterprise customers.

LGMS - LE Global Services

LGMS - LE Global Services

LGMS is a leading cyber security penetration testing and assessment firm in the Asia Pacific region.

Salem Cyber

Salem Cyber

Salem Cyber builds Artificial Intelligence (AI) solutions that work collaboratively with people to address scalability challenges in cybersecurity operations.

White Tuque

White Tuque

A new way to protect your organization. White Tuque is your partner in identifying threats, understanding your risk, and ensuring your business remains resilient.

Astrill VPN

Astrill VPN

Astrill VPN is a Seychelles based Virtual Private Network(VPN) Company.

Getronics

Getronics

Getronics guides customers through their own transformation journeys, leveraging an integrated and secure-by-design IT portfolio.

DigitalXForce

DigitalXForce

DigitalXForce is the Digital Trust Platform for the New Era – SaaS based solution that provides Automated, Continuous, Real Time Security & Privacy Risk Management.