News

2016-08-30

Zimababwe Cyber Law Threatens Freedom of Expression

Computer & Cyber Crime Bill would enable government to demand the source of information of any content it deems to be against the law.

2016-08-30

NSA Hackers Demand One Million Bitcoin

Shadowbrokers hold NSA to ransom and want to be paid in everyone’s favorite terror financing and money laundering currency - Bitcoin.

2016-09-07

Uber’s First Self-Driving Cars

Uber is fast catching up with Google in the race to introduce driverless cars.

2016-08-30

Shadowbrokers Steal NSA Hacking Tools

A mystery hacking group says it has stolen the NSA's elite Equation Group's secret toolbox and is selling it to the highest bidder. Who are they?

2016-09-07

UK Police Hire Law Firms To Tackle Cyber Criminals

Private law firms will be hired by police to pursue criminal suspects for profit, under a radical new scheme to target cyber criminals and fraudsters.

2016-08-26

Exploring Alternatives: Terrorism Converging With Cyber Crime

There is growing evidence that terrorists and criminals are converging in cyberspace. Opinion by Norman T Lihou.

2016-09-06

Keyless Entry Renders Millions Of Cars Vulnerable

Tens of millions of cars are made vulnerable to theft by their keyless entry systems, according to a report by computer security experts.

2016-09-06

15 Years After 9/11

Fifteen years ago this September 11th terrorists, using four jetliners as guided missiles, killed 2,977 people in NY. Is the USA any safer today?

2016-09-06

Cyber Spy Group Uncovered After Years Of Attacks

Symantec and Kaspersky Lab researchers have uncovered a new espionage group that is likely backed by a nation-state.

2016-09-06

Red Team: IBM Cyber Security Service Revealed

Despite efforts to find autonomous solutions to cybersecurity, IBM believes that the human factor is still important.

2016-09-05

What Happens When Two Countries Fight A Cyber War?

Imagine you woke up to find a massive cyber-attack on your country. The internet has been reduced to an error message & daily life has halted.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Chatham House

Chatham House

Chatham House is an independent policy institute based in London. Topics cover foreign affairs and defence including cyber security.

Evok

Evok

EVOK is an IT Service provider specialized in installing, maintaining and supporting IT infrastructures for SMB's in Switzerland.

AA Certification (AAC)

AA Certification (AAC)

AAC provide ISO Quality Management System certification services including ISO 27001.

National Information Security & Safety Authority (NISSA) - Libya

National Information Security & Safety Authority (NISSA) - Libya

NISSA is responsible for safeguarding the integrity, availability and resilienceof ICT infrastructure, resources, services and data in Libya.

Cyber Triage

Cyber Triage

Cyber Triage is an automated incident response software any company can use to investigate their network alerts.

High Sec Labs (HSL)

High Sec Labs (HSL)

High Sec Labs develops high-quality, cyber-defense solutions in the field of network and peripheral isolation.

Asoftnet

Asoftnet

Asoftnet are specialists in IT security, IT forensics, IT service, websites, applications and mobile solutions.

ThreatAware

ThreatAware

Total visibility of your business cybersecurity. Monitoring, management and compliance for your cybersecurity tools, people and processes from one easy to use dashboard.

UPX Technologies

UPX Technologies

UPX Technologies is one of the largest digital security centers in Brazil providing full protection for data, networks and content.

Thomsen Trampedach

Thomsen Trampedach

Thomsen Trampedach offers a tailored-made brand protection solution to each customer using a proprietary enforcement automation and reporting tool and a multilingual enforcement team.

Deepnet Security

Deepnet Security

Deepnet Security is a leading security software developer and hardware provider in Multi-Factor Authentication (MFA), Single Sign-On (SSO) and Identity & Access Management (IAM).

SHe CISO Exec

SHe CISO Exec

SHe CISO Exec is a sustainable global training and mentoring platform in information security and leadership.

MDSec

MDSec

MDSec is a consultancy with a passion for information security. Our consultants specialise in application, mobile and hardware security and targeted red team attacks.

Camelot Secure

Camelot Secure

Camelot Secure Secure360 platform is a holistic redefinition of what world-class cybersecurity strategies can be. Prepare. Protect. Deploy.

Ignite Cyber

Ignite Cyber

IGNITE Cyber is focused on enabling secure technology adoption through intelligent business decisions. We are focused on providing a secure and stable business environment for everyone.

Inoxoft

Inoxoft

Inoxoft delivers IT security consulting, assessment, and protection services to help businesses secure their infrastructure, applications, and sensitive data.