News

2015-12-16

Kazakhstan: A Poorly Thought-out Surveillance Technique or an Experiment For the West?

Basically, the Kazakh government is snooping at the highest levels on its citizens. Opinion by Christoforus Papachristou

2015-12-15

British Universities Suffer Sustained Cyber Assault

University students & faculty across the UK have been affected after the academic computer network known as Janet came under attack.

2015-12-15

ISIS Counter-Attack Anonymous

Doxing: Islamic State are hitting back at Anonymous hacktivists

2015-12-16

Encounters Between Drones & Piloted Aircraft Are Increasing

Dangerous encounters between drones and planes are rising according to new statistics from the US Federal Aviation Administration.

2015-12-18

IBM’s $1 Billion Revenue Target For Cloud In 2016

IBM has set an internal revenue goal for SoftLayer, its cloud-infrastructure business, of $1 billion in 2016, a person with knowledge of the matter said.

2015-12-16

Bitcoin's Forked: Chief Scientist Launches Alternative

Cryptocurrency bitcoin is facing civil war, with two high-profile developers announcing plans to split the code that underpins the network.

2015-12-18

Third of UK Finance Logins Risk Client Data

Many industry personnel are not assigned unique login and password details, resulting in the risk of customer's personal and financial data.

2015-12-21

Email Data Breaches: The Threat Keeps Giving

2015 - A year of unprecedented data breaches. Major government agencies & consumer sites were hacked, millions of users were compromised.

2016-01-08

What Does a Cyber Security Strategy Look Like?

The top management and board of directors should own cyber security, its implementation and response.

2015-12-18

Facebook Rule Change After Privacy Ruling

Facebook is locking people out of its site unless they are registered users, following a Belgian privacy ruling.

2015-12-14

Can Surveillance Drones Prevent the Next Kunduz?

Basic communications failures in contributed to a tragedy in which more than 30 people died at Kunduz, in Afghanistan,

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Corero Network Security

Corero Network Security

Corero Network Security is dedicated to improving the security of the Internet through the deployment of its innovative DDoS & Network Security Solutions.

Information Security Research Group - University of South Wales

Information Security Research Group - University of South Wales

The Information Security Research Group has an international reputation in the areas of network security, computer forensics and threat analysis.

ZM CIRT

ZM CIRT

ZM CIRT is the national Computer Incident Response Team for Zambia.

American Cybersecurity Institute

American Cybersecurity Institute

American cybersecurity Institute is a newly formed not-for-profit organization dedicated to education, advocacy, study and analysis in the space of cybersecurity law and policy.

Korn Ferry

Korn Ferry

Korn Ferry is a global organizational consulting firm, synchronizing strategy and talent to drive superior performance for our clients in key areas including cybersecurity.

Sierra Ventures

Sierra Ventures

Sierra Ventures is an early-stage venture firm investing globally with a focus on Next Generation Enterprise and Emerging Technologies.

SafeGuard Cyber

SafeGuard Cyber

The SafeGuard Cyber SaaS platform empowers enterprises to adopt the social and digital channels they need to reach customers, while reducing digital risk and staying secure and compliant.

DeFY Security

DeFY Security

DeFY Security is a Cyber Security solutions provider with more than 20 years of experience securing financial institutions, healthcare, manufacturing and retail.

Dataships

Dataships

We help companies automate their privacy compliance while building healthy, transparent data relationships with their customers.

Firmus

Firmus

As the leading penetration testing services provider in Malaysia, Firmus evaluates the ability of your internal or external information assets to withstand attacks.

Oman Technology Fund (OTF)

Oman Technology Fund (OTF)

Oman Technology Fund aims to make Oman the preferred destination for emerging tech companies in the region, and an attractive and stimulating destination for venture capital.

NorthStar

NorthStar

NorthStar provide the visibility needed to track and reduce risk through risk-based vulnerability management and vulnerability exploit prediction.

Infima Cybersecurity

Infima Cybersecurity

INFIMA tackle the hard parts of managing your Security Awareness Training program so you can focus elsewhere.

CSIRT-Gnd

CSIRT-Gnd

CSIRT-Gnd provides 24x7 Computer Security Incident Response Services to citizens, companies and government agencies in Grenada.

Seers

Seers

Seers is the world’s leading privacy & consent management platform for companies worldwide. Trusted by over 50,000+ businesses.

SteelGate

SteelGate

SteelGate’s core capabilities are centered around architecture design and engineering of network, systems, and cybersecurity solutions.