News

2015-05-04

Deloitte Mock a Cyberattack to Teach Business How to Respond

A security breach or big data loss can trigger an emergency for the entire business.

2015-05-04

'Killer Robots' Offer Both Risks & Advantages for Military Use

Policy analysts in Canada are grappling with limits on the military use of robots.

2015-05-06

Anonymous Hackers Taking On the Kremlin

Anonymous International release an online archive of around 40,000 text messages belonging to a powerful Kremlin official.

2015-05-06

UK Rail Signals Can Be Hacked To Cause Crashes

Rogue employee could hack the new rail system and cause a crash.

2015-05-05

Locked Shields: NATO Holds Major Cyber-Security Drill

The largest NATO cybersecurity exercise ever is underway.

2015-05-06

Russian Hackers Have Been Reading Obama’s Emails

The White House’s unclassified computer system has been breached by Russian hackers.

2015-05-07

Cybersecurity Policies for the Insurance Industry

US NAIC holds the first large scale multi-state examination of insurers' cybersecurity practices.

2015-05-04

US Defense Secretary Defines New Cybersecurity Strategy

US Department of Defense's new cybersecurity strategy includes a "renewed partnership" with the technology industry.

2015-05-04

Banking on A Spy: GCHQ Chief to Fight Bank Cybercrime

Standard Chartered Hire New Security Chief From GCHQ.

2015-05-04

US Is Still the Biggest Source of Surging Malware Attacks

A majority of the cyber attacks on US companies originate from inside the country rather than from the outside.

2015-05-07

How To Hack a Military Drone

Now hackers have a manual for breaking into unmanned systems.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Lookout

Lookout

Lookout is the data-centric cloud security company that uses a defense-in-depth strategy to address the different stages of a modern cybersecurity attack.

Aptive Consulting

Aptive Consulting

Aptive is a cyber security consultancy providing Penetration Testing and Vulnerability Assessment services.

CERT-PY

CERT-PY

CERT-PY is the national Computer Emergency Response Team for Paraguay.

LRQA

LRQA

LRQA is an award-winning global provider of cybersecurity services, bringing innovative thought leadership to the ever-evolving cybersecurity marketplace.

Data443 Risk Mitigation

Data443 Risk Mitigation

Data443 Risk Mitigation provides next-generation cybersecurity products and services in the area of data security and compliance.

ArmorText

ArmorText

ArmorText offers a seamless channel for communication and collaboration for organizations concerned with keeping communication data private and secure.

Stealth-ISS Group

Stealth-ISS Group

Stealth–ISS Group is your extended IT, cyber security, risk and compliance team, providing strategic guidance, engineering and audit services, along with technical remediation and security operations.

GAVS Technologies

GAVS Technologies

GAVS is a global IT services provider with focus on AI-led Managed Services and Digital Transformation.

IntelliGenesis

IntelliGenesis

IntelliGenesis provide comprehensive cyber, data science, analysis, and software development services that provide tailored, secure solutions for your critical data and intelligence needs.

SoloKeys

SoloKeys

SoloKeys provides the first open-source FIDO2 security key: Protect your online accounts against unauthorized access by using the most secure login method.

Cynomi

Cynomi

Cynomi is a leading strategic cybersecurity operations platform that automates cybersecurity knowledge and expertise to empower teams with little to no in-house expertise.

NetApp

NetApp

The NetApp portfolio includes intelligent cloud services, data services, and storage infrastructure that helps organizations manage applications and data everywhere across hybrid cloud environments.

SektorCERT

SektorCERT

SektorCERT is the cybersecurity center for the critical infrastructure sectors in Denmark. We help detect and handle when critical infrastructure is exposed to cyber attacks.

Q-Bird

Q-Bird

Q*Bird's mission is to provide equipment for the current, and future European quantum internet.

Inveo Group

Inveo Group

Inveo group is the Italian leader for the management of privacy and data protection issues.

Grey Market Labs

Grey Market Labs

Grey Market Labs is a special place. It is a data privacy and security skunkworks.