News

2016-02-10

What Is Human In The Age of Technology?

The evolutionary pressures surrounding machines are every bit as intense as in nature, and with few of its constraints.

2016-02-09

Active Cyber Defense Task Force

The US Center for Cyber and Homeland Security has launched a new project about active defense by the private sector against cyber threats.

2016-02-05

Who Needs A Computer Science Degree Anyway?

While they can’t necessarily replace a college degree, MOOCs are playing a key role in addressing the software development skills gap.

2016-02-12

EU Protects Online Data Quite Differently From The US

What control do you have over how companies collect & use your information? Different approaches in the US & EU have consequences.

2016-02-10

TalkTalk's Cybersecurity Lesson

TalkTalk has been hacked three times in the past year. Companies must invest wisely to properly protect their customers & their reputations.

2016-02-09

Self-Driving Car Poses High Hacking Risk

Big car companies are soon to introduce self-driving technology, threatening to open a whole new range of security problems

2016-02-10

How to Recover From The Hack Nightmare

It’s more than just the PR department’s “problem.” IT executives need to be involved in managing the fallout and crafting responses.

2016-02-10

China’s Dangerous View of Cyber Deterrence

PLA military doctrine: Cyber deterrence lacks credibility because cyber weapons have yet to be used in real warfare.

2016-02-09

HSBC Bank In The Line Of Cyber Fire

HSBC says its UK online banking operation is being affected for the second time this year by a cyber attack that started in January.

2016-02-10

Protecting The Crown Jewels Of Corporate Data

Knowing that an organization will suffer a breach sooner or later, IT security professionals must first protect the company's most important data.

2016-02-09

Intelligence Agencies Want To Target Surveillance Programs

IoT devices and cloud-based services represent the next frontier for digital surveillance, claims a new report from Harvard's Berkman Center.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Synology

Synology

Synology provides high-performance, reliable, and secure Network Attached Storage (NAS) products.

Mellanox Technologies

Mellanox Technologies

Mellanox Technologies is a leading supplier of end-to-end Ethernet and InfiniBand intelligent interconnect solutions and services for servers, storage, and hyper-converged infrastructure.

Gradiant

Gradiant

Gradiant’s mission is to contribute to the growth and competitive improvement of Galician businesses through technology development and innovation using ICT.

Traced

Traced

At Traced, our aim is to redefine mobile cyber security to provide the best possible protection to everyone against breaches of privacy and security.

StoneLock

StoneLock

StoneLock is a trusted leader in the design and manufacture of facial recognition software and technology.

SandboxAQ

SandboxAQ

SandboxAQ is an enterprise SaaS company combining AI + Quantum tech to solve hard problems impacting society.

LogicGate

LogicGate

The LogicGate Risk Cloud™ is an agile GRC cloud solution that combines powerful functionality with intuitive design to enhance enterprise GRC programs.

Verica

Verica

Verica uses chaos engineering to make systems more secure and less vulnerable to costly incidents.

PureSquare

PureSquare

PureSquare exist to empower people with simple solutions for their increasingly complex digital security & online privacy needs.

DruvStar

DruvStar

DruvStar provides B2B cybersecurity around threat management to strengthen businesses across attack vectors.

Cybersecurity Dubai

Cybersecurity Dubai

Protect your business from cyber-attacks with Cybersecurity Dubai, your partner in online security solutions.

ZainTech

ZainTech

Zaintech is a regional digital & ICT solutions provider offering comprehensive digital solutions and services to enterprise and government customers in the MENA region.

BCX

BCX

BCX, a subsidiary within Telkom Group, is one of Africa’s largest systems integrator and digital transformation partners for enterprises and public sector organisations.

International Maritime Cyber Security Organisation (IMCSO)

International Maritime Cyber Security Organisation (IMCSO)

The IMCSO mission is to be the standard in the maritime cyber security industry, a collective voice, working towards alignment and standardisation.

CodeShield

CodeShield

CodeShield is a SaaS that helps software developers and security teams secure IAM in the public cloud. With us, you detect IAM privilege escalations easily and achieve least privilege.

Highway Ventures

Highway Ventures

HIGHWAY Ventures is a startup studio that builds cybersecurity and vertical AI companies in Northwest Arkansas from technology developed within the federal lab ecosystem.