News

2016-07-13

Air Gapping Critical Process Control Networks

Oil giant Chevron has chosen to air gap critical systems to disconnect them from the Internet as much as possible.

2016-07-15

Your Server Has Been Hacked… What Next?

Online criminals trawl the net looking for vulnerable servers. The long-term the chances of an Internet-facing server being hacked approach certainty.

2016-07-14

Bank of England: Cyberattacks A 'Clear and Present Danger'

The Bank of England’s CISO says cyber-attacks are an ongoing danger for firms and building defenses is not just a technical issue.

2016-07-13

Global 'Terror Database' Leaked

The "terrorist database" World-Check used by global banks and intelligence agencies has been leaked.

2016-04-28

Cities Face Multiple Security Threats

City planners must defend against multiple types of security threats, both man-made and natural, physical and virtual.

2016-07-14

Pentagon Unprepared to Repel Cyber Attacks

The Pentagon's new Cyber Command has carried out it's first defensive exercise to repel a simulated attack on US infrastructure.

2016-07-13

Companies Should Tackle Cybercrime & 'take the fight to the criminals'

Today’s cybercriminal often works for complex operations akin to businesses, with HR resources and R&D budgets.

2016-07-12

EU Signs Cyber-Security Agreement With Industry

The EU Commission has launched a public-private partnership on cybersecurity expected to trigger €1.8 Billion of investment by 2020.

2016-07-12

Darktrace Cybersecurity Raises New Funding

Darktrace, a UK based cybersecurity startup that uses artificial intelligence to detect threats gets $65m new investment.

2016-07-12

BMW, Intel and Mobileye Developing Self-Driving Cars

Car manufacturer joins forces with US computer chip giant and Israeli technology firm to bring fully automated driving into production by 2021.

2016-07-18

The Global War of Narratives and the Role of Social Media

The unique characteristic of social media is that it empowers and enables individuals to engage in ways previously unseen. Opinion by Anja Kaspersen.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

SABSACourses

SABSACourses

SABSA is a development process used for solving complex problems such as IT Operations, Risk Management, Compliance & Audit functions.

Duo Security

Duo Security

Duo combines security expertise with a user-centered philosophy to provide two-factor authentication, endpoint remediation and secure single sign-on tools.

EdgeWave

EdgeWave

EdgeWave provides simple but highly effective data security and advanced threat protection in solutions that are affordable, scalable and easy to use.

InPhySec

InPhySec

InPhySec is a leading New Zealand information, physical and cyber security company.

ReFirm Labs

ReFirm Labs

ReFirm Labs provides the tools you need for firmware security, vetting, analysis and continuous IoT security monitoring.

Abnormal Security

Abnormal Security

Abnormal is an API-based email security platform providing protection against the entire spectrum of targeted email attacks.

Cybersec Infohub

Cybersec Infohub

Cybersec Infohub is a Hong Kong government programme to enhance the exchange of cyber security information with industry and enterprises to jointly defend against cyber attacks.

Vivitec

Vivitec

Vivitec security services are tailored for your business, industry, risk, technology, and size to ensure great protection and planned response for the inevitable cyber-attacks on your business.

VLC Solutions

VLC Solutions

VLC Solutions is an independent solutions and technology service provider offering Cloud Services, Cybersecurity, ERP Services, Network Management Services, and Compliance Solutions.

Elba

Elba

Employee security needs to be reinvented. SaaS security needs to involve end-user and awareness needs to be actionable. Meet elba, the 5-in-one cybersecurity hub with no compromises.

ASMGi

ASMGi

ASMGi is a managed services, security and GRC solutions, and software development provider.

Fingerprints

Fingerprints

Fingerprints is the world-leading biometrics company. Our solutions are found in millions of devices providing safe and convenient identification and authentication with a human touch.

Ampsight

Ampsight

Ampsight specializes in enabling cloud integration, securing data, and navigating complications that drive critical-mission success.

RAH Infotech

RAH Infotech

RAH Infotech is India’s leading value added distributor and solutions provider in the Network and Security domain. We are specialists in Enterprise and App Security and Application Delivery.

Defence Logic

Defence Logic

Defence Logic is a cyber security company serving clients in many business sectors. Our consultancy services include Penetration Testing, Security Reviews and Monitoring.

QuantumGate

QuantumGate

QuantumGate are a team of world-class cryptographers, cybersecurity professionals and researchers. We help organizations protect their data assets in a post-quantum world.