News

2016-09-14

Cybercrime & Cyberwar: A Spotter's Guide

Cybercriminals are as varied as other Internet users: They have different tools, objectives & specialties. Understanding them can defend against them.

2016-09-10

Critical Infrastructure Is The Next Target

The way we think about cyber-attacks changed when Ukraine experienced the first recorded power outage caused by a cyber-attack.

2016-09-13

Canadian Companies Vulnerable To Cyber-Attacks

Canadian organizations aren’t prepared for the rising caliber of attacks, according to Deloitte’s 2015 cyber security survey.

2016-09-17

Australian Government Networks Hacked

Sensitive Australian Government and corporate computer networks have been penetrated by sophisticated cyber-attacks.

2016-09-19

UAE Using Israeli Spy Technology

The United Arab Emirates uses Israeli malware capable of turning Apple’s iPhones into remote spying devices to clamp down voices of dissent.

2016-09-09

Are US Voting Machines Secure From Hackers?

Some states have declined to scan voting systems for hackers ahead of the presidential US elections.

2016-09-08

Islamic State Members Embedded In Government

The Kuwaiti interior ministry has arrested a governmental insider for hacking the official websites and spreading the IS propaganda.

2016-09-09

Cyber Vulnerability Identified In Major Weapons Systems

The US Pentagon is worried about uncovering cyber flaws in it's strategic weapons systems.

2016-09-21

Who Are We In the Cyber World?

Reading List: Mary Aiken's book 'The Cyber Effect' is about how the Internet is shaping development, behavior and our perception of the world.

2016-09-08

Thai Cyber Bank Fraud Gang Busted

Thai police have caught a gang who stole personal information through an elaborate, Internet-enabled scam.

2016-09-07

Rio 2016 Olympic Games: IoT Technologies Win

The Rio 2016 games have brought a new aspect of technology to sports for live stadium audiences as well as television viewers internationally.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CIRCL

CIRCL

CIRCL is the national Computer Incident Response Center of Luxembourg

LSEC

LSEC

LSEC is a global innovator and facilitator for the Cybersecurity industry. It is a non-profit membership organisation supporting further maturing the industry through its end users.

NFIR

NFIR

NFIR is a specialist in the field of cyber security incident response and digital forensics.

Shift5

Shift5

Shift5 focus on securing operational technology (OT) by building best-in-class, dual-use products serving military and commercial entities.

Stone Forest IT (SFIT)

Stone Forest IT (SFIT)

Stone Forest IT specialises in providing advisory, implementation and managed services for IT infrastructure, IT security solutions, business applications (ERP and CRM) and business analytical tools.

1Password

1Password

1Password combines industry-leading security with award-winning design to bring private, secure, and user-friendly password management to everyone.

Cyvatar

Cyvatar

Cyvatar is a technology-enabled cyber security as a service (CSaaS) provider delivering smarter managed security to help you achieve compliance and security faster and more efficiently.

Swiss Cyber Institute (SCI)

Swiss Cyber Institute (SCI)

The Swiss Cyber Institute is a registered cyber security education provider by the State Secretariat for Education, Research, and Innovation SERI.

Easy Dynamics

Easy Dynamics

Easy Dynamics is a leading technology services provider with a core focus in Cybersecurity, Cloud Computing, and Information Sharing.

CoreStack

CoreStack

CoreStack helps enterprises overcome cloud challenges such as ever growing security risks, stringent regulatory compliance needs and operational complexities.

Halcyon

Halcyon

Halcyon is the industry’s first dedicated, adaptive security platform focused specifically on stopping ransomware attacks.

Sword Group

Sword Group

Sword is a leader in data insights, digital transformation and technology services with a substantial reputation in complex IT, business projects and mission critical operations.

Bedrock Security

Bedrock Security

Bedrock Security is at the forefront of revolutionizing data security in the cloud and GenAI era.

Defend-OT

Defend-OT

Defend-OT is a Belgium-based cybersecurity firm specializing in OT environments.

SmartSea

SmartSea

SmartSea, a pioneering venture founded in collaboration with SITA, a global leader in aviation technology, is setting new standards in maritime digital transformation.

ENKI WhiteHat

ENKI WhiteHat

ENKI WhiteHat is an offensive security specialist, preemptively addressing cyber threats from a hacker’s perspective.