News

2015-06-29

The Coming Cyberpeace

The Normative Argument Against Cyberwarfare

2015-06-29

Data to Analyse Human Interaction with the Environment

Researchers are looking to the Internet of Things for new ways to analyze the relationship between humans & their environments.

2015-06-29

Seasoned Cybersecurity Professionals : 3 - 5 months Contracts in the US

Must have a Security Clearance or be capable of obtaining one. The work sites are Boston, Denver, Kansas City, Philadelphia, & Wash DC.

2015-06-29

Google Enters Fray For Tesco Loyalty Unit

Tesco’s customer loyalty arm is for sale and Google are interested in buying. For $2 billion.

2015-06-29

How to Hire and Retain the Best IT Talent

How can a company without unlimited resources appeal to and maintain the workforce they need?

2015-06-29

Cambridge to Open Cyber Security Research Centre

The Cambridge Cloud Cybercrime Centre will focus on enhancing our understanding of cyber crime, security tools & techniques.

2015-06-29

NSA Has Reverse-Engineered Consumer Anti-Virus Software To Track Users

The NSA and GCHQ have put extensive effort into hacking popular security software products to “track users and infiltrate networks.”

2015-06-29

GCHQ's Surveillance of Rights Groups is Illegal

Although the interception was lawful, GCHQ retained emails for longer than it should have & violated its own internal procedures.

2015-06-29

The Dangers Of Internet-of-Things In Healthcare

Medical device connectivity to consumer technology raises alarming questions about privacy violation & intentional disruption.

2015-06-29

The Double-Edged Sword of Cyber Warfare

The Israeli army has recognized cyber weapons as a fourth dimension of warfare, alongside land, air and sea.

2015-06-29

FBI Alert: CryptoWall Ransomware Damage $18 Million

The most used vector are phishing emails that have a zipped attachment that claims to be a resume.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Information Commissioner's Office (ICO) - UK

Information Commissioner's Office (ICO) - UK

The Information Commissioner's Office is an independent authority set up to uphold information rights in the public interest.

Duane Morris LLP

Duane Morris LLP

Duane Morris is a global law firm with offices in the USA, UK and Asia. Practice areas include Cybersecurity.

Detectify

Detectify

Detectify is a web security service that simulates automated hacker attacks on your website, detecting critical security issues before real hackers do.

HireVergence

HireVergence

HireVergence is a full service IT staffing and recruiting firm with a focus on cyber and information security.

L J Kushner & Associates

L J Kushner & Associates

L.J. Kushner is a leading Information Security recruiting firm.

TruNarrative

TruNarrative

TruNarrative provides a unified solution for Identity Verification, Fraud Detection, eKYC, Risk Assessment, AML Compliance and Account Monitoring.

Elron Ventures

Elron Ventures

Elron partner with early stage ventures to build companies that transform lives and industries. Our main areas of focus are enterprise software, cybersecurity, and healthcare.

PAX Momentum

PAX Momentum

PAX Momentum is the Mid-Atlantic’s premier startup accelerator, specializing in cyber, enterprise software, telecom, CleanTech, FinTech, InsureTech, and AI.

TAG Cyber

TAG Cyber

TAG Cyber's mission is to provide world-class cyber security research, advisory, and consulting services to enterprise security teams around the world.

ClearVector

ClearVector

ClearVector is a leading provider of realtime, identity-driven security for the cloud.

Blattner Technologies

Blattner Technologies

Blattner Technologies mission is to be the leading provider of predictive transformation services and tools in the Data Analytics, Artificial Intelligence and Machine Learning industry.

SecurityBridge

SecurityBridge

SecurityBridge provide a cybersecurity connection between our customers’ IT departments, the forward-facing business services, and their SAP applications.

Paramount Defenses

Paramount Defenses

Paramount Defenses have unrivaled capability in two of the most critical areas in cyber security today – Active Directory Security and Privileged Access.

Yokai

Yokai

Yokai is a secure, distributed platform for data communication with enhanced security features tailored for classified environments such as finance, defence, healthcare, cybersecurity, and more.

RealmOne

RealmOne

RealmOne addresses the most challenging issues in the realms of defense and cyberspace, adapting to the continuously changing demands of our national security customers.

Cybermindz

Cybermindz

Many cyber security professionals are under sustained and increasing stress. We set about providing direct support to restore and rebuild emotional and cognitive health.