News

2016-04-05

How The CIA Is Making Sense Of Big Data

The CIA’s new spying strategy is to make sense of big data, the technological explosion of connectivity, data sensors, devices & people.

2016-04-04

Who Is The Cybersecurity Guy In Your Organisation?

Cybersecurity is everyone’s responsibility, isn't it?

2016-04-04

Four Startup Companies That Are Harnessing AI In The Invisible Cyberwar

Examples of Cybersecurity startups working on automated systems they hope will be more effective than hiring human enterprise security teams.

2016-04-04

FBI Cancels Apple Court Hearing

The FBI has dropped the scheduled court hearing and showdown over its demands that Apple help unlock a terrorist’s iPhone.

2016-04-04

New Study Ranks Nations On Cyber Vulnerability

Data-mining experts have ranked the vulnerability of forty-four nations to cyberattacks and the results may surprise you.

2016-04-01

Apple's Questionable Victory Over the FBI

Apple has suffered one major casualty in its legal victory over the FBI: bragging rights over the iPhone’s security.

2016-04-04

Cars Really Are Increasingly Vulnerable To Cyberthreats

Modern cars are "increasingly vulnerable" to hacking after researchers proved it is possible to disable brakes and manipulate steering remotely.

2016-04-01

Ex-CIA Chief: ‘If we don’t handle China well, it will be catastrophic’

General Michael Hayden turned the CIA into a militarised force. He now thinks the obsession with counter-terrorism obscures more serious threats.

2016-03-30

Germany’s BND Intelligence Agency Is Cutting Cooperation With The NSA

Germany's BND has drastically cut cooperation with the NSA over covert US surveillance of European officials and companies.

2016-04-01

What Do UK Consumers Think About SMEs’ Cyber Security?

KPMG's Small Business Reputation & The Cyber Risk survey gives us valuable information about what consumers think about cyber security.

2016-03-31

5 Major US Hospital Hacks

In real-world war, combatants typically don’t attack hospitals. In the cyber realm, hackers have no such scruples.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

LexisNexis Risk Solutions

LexisNexis Risk Solutions

LexisNexis Risk Solutions provides technology solutions for Anti-Money Laundering, Fraud Mitigation, Anti-Bribery and Corruption, Identity Management, Tracing and Investigation.

National Authority Against Electronic Attacks (NAAEA) - Greece

National Authority Against Electronic Attacks (NAAEA) - Greece

The National Authority Against Electronic Attacks (NAAEA) is the national computer emergency response team of Greece.

Slovenian Digital Coalition

Slovenian Digital Coalition

Slovenian Digital Coalition is a coalition working in the field of smart cities, e-commerce, e-skills, e-inclusion, cyber security, internet and other areas related to developing the digital society.

Southwest Research Institute (SwRI)

Southwest Research Institute (SwRI)

Southwest Research Institute SwRI are R&D problem solvers providing independent services to government and industry clients. Areas of expertise include Cybersecurity, Intelligent Networks and IoT.

CyberFortress

CyberFortress

CyberFortress is an insuretech startup offering a new kind of online business interruption policy designed for small business.

Scythe

Scythe

SCYTHE is a next generation red team platform for continuous and realistic enterprise risk assessments.

Navixia

Navixia

As a leading Swiss IT security specialist, Navixia offers a global and pragmatic approach to information security.

Trisul Network Analytics

Trisul Network Analytics

Trisul helps organizations deploy full spectrum deep network monitoring which can serve as a single source of truth for performance monitoring, security analytics, threat detection and compliance.

Infinipoint

Infinipoint

Infinipoint pioneers the first Device-Identity-as-a-Service (DIaaS) solution, addressing Zero Trust device access and enabling enterprises of all sizes to automate cyber hygiene.

Primus Institute of Technology

Primus Institute of Technology

At Primus Institute of Technology our mission is to inspire, support, and empower current and aspiring IT professionals through training and career development workshops.

Istari

Istari

ISTARI is a new kind of cyber risk management company. We’re an agile collective of best-in-class capabilities and experts, who build ongoing partnerships with clients.

Avrem Technologies

Avrem Technologies

Avrem Technologies is a business IT and cybersecurity consulting firm. We design, implement, manage and monitor the networks, servers, computers and software that our clients rely on each day.

CodeLock

CodeLock

Codelock is a patent-pending solution that continuously provides software security at the code level, while providing advanced management insights with performance metrics and data analytics.

Google Safety Engineering Center (GSEC)

Google Safety Engineering Center (GSEC)

GSEC Málaga is an international cybersecurity hub where Google experts work to understand the cyber threat landscape and to create tools that keep users around the world safer online.

ITButler e-Services

ITButler e-Services

At IT Butler, our mission is crystal clear: we are dedicated to providing top-tier cybersecurity solutions and best-practice methodologies to secure and enhance your digital infrastructure’s resilienc

Trofi Security

Trofi Security

Trofi Security provides Information Technology and Information Security services to organizations in both the public and private sectors.