News

2015-11-30

Can Cyber Intelligence Help Policing Defeat Terrorism?

Opinion by Gavin Thomas, Vice president, British Police Superintendents Association

2015-11-30

Tackling Crime On The Dark Web

GCHQ and the National Crime Agency (NCA) in the UK have formed a new unit with which to police the Dark Web.

2015-11-24

Signal: The Snowden-Approved Crypto App Comes to Android

Open Whisper Systems’ encryption tools already have a wide footprint: Their messaging App Signal, used by Edward Snowden, is now available on Android.

2015-11-24

ISIS' 'Cyber Caliphate' Hacks 50,000+ Twitter Accounts

Islamic State has reportedly hacked tens of thousands of Twitter accounts and posted phone numbers of CIA and FBI chiefs online.

2015-11-30

Entrepreneur’s Guide To Surviving A Tech Bubble

Venture Capital money is chasing the next tech Unicorn. As cyber security is the hot startup sector it's time to ask a few questions.

2015-11-23

Phony War: US Military To Carry Out Pretend Cyber War Against China & Russia

US lawmakers want to project more power in the newest military domain.

2015-11-23

A Spy Firm’s Price List for Secret Hacker Techniques

The zero-day broker startup Zerodium has published it's price list for different classes of digital intrusion techniques & software targets.

2015-11-23

Restricting Encryption Wouldn’t Stop Paris-Style Attacks

It’s not clear that undermining strong encryption would do anything to prevent terrorism.

2015-11-23

Britain Building Cyber Forces to Attack ISIS

Britain will bolster spending on cyber defences, simplify its state cyber structures and build its own offensive cyber capability to attack adversaries.

2015-11-23

Anonymous Acts on Cyber War Threat

Anonymous is making good on its declaration of cyber war on terrorist group ISIS.

2015-11-21

After Paris, ISIS Moves Propaganda Machine to Darknet

In a series of blog posts and messages sent to its users right after the Paris attacks, ISIS news & forums are moving entirely to the Dark Net.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

E-Tech

E-Tech

E-Tech has been providing system support and information technology consulting services including Internet and Network Security assessments.

Bob's Business

Bob's Business

Bob's Business adopts a fresh approach to information security awareness and compliance training, delivering key information through the use of short animated movies.

Beame.io

Beame.io

Beame.io is an information security company that distributes open source authentication infrastructure based on encryption.

Penta Security

Penta Security

Founded on its data encryption technology, Penta Security is a leading provider of web and data security products, solutions and services.

Squalio

Squalio

Squalio is an information technology group that delivers solutions and services for secure and effective IT management.

Siemens

Siemens

Siemens Industrial Security Services provide solutions for cybersecurity in automation environments based on the recommendations of the international standard IEC 62443.

boxxe

boxxe

boxxe create flexible IT infrastructures, collaborative global workspaces and data clarity, all underpinned by world-leading security.

PrivacySavvy

PrivacySavvy

PrivacySavvy's mission is to provide you with all the information that you need to ensure that your internet privacy is intact, your devices are secure, and that any time you step online, you’re safe.

SAM Seamless Network

SAM Seamless Network

SAM Seamless Network is a cybersecurity technology platform that protects the connected home, by tackling cyber security threats at the source.

Mainstream Technologies

Mainstream Technologies

Mainstream Technologies is an information technology services firm specializing in custom software development, managed IT services, cybersecurity services and hosting.

Abacus Group

Abacus Group

Abacus Group is a global IT services firm for alternative investment firms, providing an enterprise technology platform specifically designed to meet the unique needs of financial services.

Hawk AI

Hawk AI

Hawk AI’s mission is to help financial institutions detect financial crime more effectively and efficiently using AI to enhance rules and find anomalies.

Galvanick

Galvanick

Galvanick enables your operations and IT teams to protect your industrial systems and networks against digital threats.

Digital Encode

Digital Encode

Digital Encode is a leading consulting and integration firm that specializes in the design, management, and security of business-critical networks, telecommunications, and IT infrastructures.

StackGen

StackGen

StackGen (formerly appCD) automatically generates Infrastructure from Code (IfC) based on application code with golden standards applied.

ArmorX AI

ArmorX AI

ArmorX AI (formerly Kapalya) operates an encryption management platform designed to encrypt all data in transit and at rest on mobile end-points, corporate servers, and cloud servers.