News

2015-09-29

The Differences Between Targeted Attacks and Advanced Persistent Threats

Very different and equally nasty, dealing with either of them calls for prudent strategy and dedication.

2015-09-29

8 Ways to Fend Off Spyware

Spyware, malware, phishing and, more recently, ransomware - the list of online threats can be confusing and daunting.

2015-09-29

Cyber Liability Insurance’s Data Problems

Security leaders need to understand their role in helping the insurance industry by providing greater transparency.

2015-10-05

Cyber Peace? The U.S and China Reach an ‘Understanding’

The two leaders agree neither government will knowingly support the theft of corporate intellectual property. By Jamie Collier

2015-10-05

Insiders Responsible for 43% of Data Breaches

Among companies experiencing data breaches, internal actors were responsible for 43% of data loss, half of which was intentional, half accidental.

2015-09-28

Xi Jinping At Seattle Tech Summit

Microsoft co-founder Bill Gates is one of the many US tech leaders Chinese President Xi Jinping is meeting with during his visit to Seattle.

2015-09-28

The U.S Is Losing the Cyber War

The Hacking of America: The Office of Personnel Management Hack comes after years of the U.S. passivity despite repeated digital attacks.

2015-09-27

GCHQ Has Spied on Every Web User, Ever…

Nothing to hide, nothing to fear? GCHQ and Operation Karma Police: Collecting the browsing habits of "every visible user on the Internet"

2015-09-27

Snowden Wants Global Push to Expand Digital Privacy

NSA whistleblower speaks via video link at launch of ‘Snowden Treaty’, which calls for global push for protections in wake of surveillance revelations.

2015-09-26

No US Cyber Peace Agreement with China.

The issue of the Chinese regime sponsoring hackers to rob American companies to feed the Chinese economy is reaching boiling point.

2015-09-25

Cyberspace: The New Frontier in Warfare

Modern attackers will destroy enemy sensors, communications & decision-making loops. Opinion By Espen Barth Eide & Anja Kaspersen

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Prolinx

Prolinx

Prolinx provide secure Data Centre hosting services and other fully managed security services for networks and information systems.

Foundation Futuristic Technologies (FFT)

Foundation Futuristic Technologies (FFT)

FFT is a global leader in computer forensics and digital investigation solutions.

Picasso

Picasso

The Picasso project is focused on ICT Policy, Research and Innovation for a Smart Society: towards new avenues in EU-US ICT collaboration.

Center for Identity - University of Texas at Austin

Center for Identity - University of Texas at Austin

The mission of the Center is to deliver the highest-quality discoveries, applications, education, and outreach for excellence in identity management, privacy, and security.

ID Agent

ID Agent

ID Agent provides a comprehensive set of threat intelligence and identity monitoring solutions.

Introspective Networks

Introspective Networks

Introspective Networks (IN) is a Cybersecurity company focusing on securing data in the network and automating knowledge work to decrease vulnerability points to critical infrastructure.

OmniNet

OmniNet

OmniNet delivers the next generation of cybersecurity and is the only provider in the market to move the edge of small businesses to a virtual, omnipresent perimeter.

SkillCube

SkillCube

SkillCube is one of the pioneers in India focusing on Cyber Security Skill Development Solutions.

Xperien

Xperien

Xperien is a leading South African Information Technology Asset Disposition (ITAD) company.

Cyentia Institute

Cyentia Institute

The Cyentia Institute is a research & data science firm with a mission to advance knowledge in the cybersecurity industry.

Emagined Security

Emagined Security

Emagined Security is a leading provider of professional services for Information Security and Compliance solutions.

Appurity

Appurity

Appurity specialises in mobile and application security, delivering comprehensive solutions across all verticals.

Beaming

Beaming

Beaming is an established Internet Service Provider for businesses across the UK. We deliver reliable voice, data and managed services, including cybersecurity.

Surf Security

Surf Security

SURF Security has transformed the browser into your strongest security asset while providing complete end-user privacy – all with full compliance.

RESTIV Technology

RESTIV Technology

RESTIV Compliance Copilot is your partner in continuous compliance. Real-time monitoring, continuous testing, and transparent evidence—no surprises, just peace of mind.

Harness

Harness

Harness delivers an end-to-end software delivery platform that helps engineering teams achieve the highest levels of engineering excellence.