News

2015-07-21

IS uses Encrypted Apps says FBI Chief

Security forces cannot access the encrypted platforms being used by Islamic State to recruit lone-wolf terrorists.

2015-07-21

IBM Unveils Most Powerful Chip Ever Created

Moore's Law in Action: Smaller, Faster, Cooler, More Powerful.

2015-07-21

Cyberwarfare is Common in Russia

Hacker Hell: It's a virtual civil war ...

2015-07-21

4 Signs a Board thinks Security is Better than it Is

Ponemon Institute survey shows a gap in perception between boards of directors and IT executives.

2015-07-21

CyberSecurity Future: Humans & Machines Work Symbiotically

Outnumbered: Because of the IoT there will be over 40 billion connected devices in use within five years.

2015-07-20

Assange says NSA intercepts 98% of S. American Coms

A growing list of American allies, in addition to France & Germany are being spied on by the NSA.

2015-07-20

Repelling the cyber-attackers

Good cybersecurity is not just a technology function.

2015-07-20

The Most Damaging Ramifications of DDoS Attacks

Loss of customer trust & confidence are the most damaging consequences of DDoS attacks.

2015-07-20

Airlines on Defence Amid Cyber Warfare: IATA

Greater levels of automation mean the aviation industry is more vulnerable to cyber threats

2015-07-18

The Focus on Terror has Distorted the Debate on Encryption

The Hacking Team scandal and a successful challenge to UK Surveillance laws coincide. Opinion by Alex Krasodomski

2015-07-17

The Right for Privacy in a World Where Everything is Shared

The latest revelations about Hacking Team, its products & it its clientele seem to shock everyone. Lets’ see how truly shocking this is.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ExaGrid Systems

ExaGrid Systems

ExaGrid provides Tiered Backup Storage with a unique disk-cache Landing Zone, long-term retention repository, and scale-out architecture.

IGEL Technology

IGEL Technology

IGEL Technology is one of the world's leading thin client vendors. Thin clients increase data security and compliance.

Hyve

Hyve

Hyve provide a wide range of managed web hosting services including private, hybrid and public VMware cloud hosting.

Sungard Availability Services (Sungard AS)

Sungard Availability Services (Sungard AS)

Sungard AS partners with customers around the globe to understand their unique business needs and provide production and recovery services tailored to their requirements.

New Zealand Internet Task Force (NZITF)

New Zealand Internet Task Force (NZITF)

The New Zealand Internet Task Force (NZITF) is a non-profit with the mission of improving the cyber security posture of New Zealand.

National Cybersecurity Competence Centre (NC3) - Czech Republic

National Cybersecurity Competence Centre (NC3) - Czech Republic

NC3 has been established in response to growing demands for practically applicable products and solutions for ensuring cybersecurity of critical and non-critical information infrastructures.

German Israeli Partnership Accelerator (GIPA)

German Israeli Partnership Accelerator (GIPA)

GIPA is based on two pillars: it is an incubator aimed at young academics and a program to transfer cybersecurity expertise to corporate partners.

CybX Security LLC

CybX Security LLC

CybX is the first company of its kind to merge the practice of computer forensics with computer security and information security.

Spohn Solutions

Spohn Solutions

Spohn combines highly-experienced staff with a vendor neutral approach to deliver optimal solutions for IT Security and Compliance.

Hexaware Technologies

Hexaware Technologies

Hexaware is an automation-led next-generation service provider delivering excellence in IT, BPO and Consulting services.

XioGuard

XioGuard

XioGuard is a managed security service for 360-degree cybersecurity coverage, protecting the entire attack surface, increasing performance, reducing cost, and simplifying operations.

Eviden

Eviden

Eviden is an Atos business that brings together its digital, big data and security business lines. It will be a global leader in data-driven, trusted and sustainable digital transformation.

Intellinexus

Intellinexus

Intellinexus turns data into actionable insights to revolutionise decision-making in your business.

ExactTrak

ExactTrak

ExactTrak provide embedded cyber security solutions for your digital devices – whenever and wherever you need them.

CyPro

CyPro

CyPro is a cyber security expert firm that specialises in providing cyber security services tailored for high-growth companies at every stage of their journey.

Maze

Maze

At Maze, we’re dedicated to changing how security teams understand and act on vulnerabilities — especially in cloud and application environments.