News

2015-05-19

"Skynet" is Real and Could Flag You as a Terrorist

Documents leaked by NSA whistleblower Edward Snowden confirm that the Skynet program exists.

2015-05-19

Russia & China Grow Closer With New Cyber Agreement

Russia and China have vowed not to launch cyber attacks against each other, leaving more time to attack other targets.

2015-05-19

Growing number of corporate cyber attacks in Ireland

More than half of Irish companies suffered a security incident last year.

2015-05-19

Iran Ministry Of Defense Hacked By Saudi Hacker

Saudi RxR HaCker hacked & defaced the official website of Iranian Ministry of Defense.

2015-05-19

Pro-ISIS Hackers Threaten the US & EU

“We are the hackers of the Islamic State. The electronic war has not yet begun,”

2015-05-19

Police Scotland Invests £1.5 million in Cybercrime Hub

A specialist investigation centre in Edinburgh to carry out forensic digital examinations in support of police investigations.

2015-05-19

Want to be a Hacker? GCHQ wants you!

Are you "committed and responsible" with the "potential to carry out computer networks operations to keep the UK safe."?

2015-05-19

Fast Growing Companies Use CIOs Technology Strategy

Over performing companies tend to lean more heavily on CIOs during the long-term planning process.

2015-05-18

Russian Cyber Attack Threat to Global Banking System

A backdoor program that is delivered to victims through spear-phishing emails or drive-by downloads.

2015-05-18

Google Says Self-Driving Cars Drive Better Than You

Google has a fleet of 20 plus self-driving cars which are now averaging around 10,000 self-driven miles per week.

2015-05-16

Hiring A Hacker – So, how much do they charge?

The perception of the role of hackers is completely changed as they are increasingly sought by private companies & intelligence agencies.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Atlantic Council

Atlantic Council

The Atlantic Council's Cyber Statecraft Initiative focuses on international cooperation, competition, and conflict in cyberspace.

Foregenix

Foregenix

Foregenix are global specialists in Digital Forensics and information security including Penetration testing and Website Security.

Japan Information Security Audit Association (JASA)

Japan Information Security Audit Association (JASA)

JASA is non-profit association active in developing and managing the quality of Information Security Auditing and Auditors in Japan.

Redjack

Redjack

Redjack is a cutting-edge network analytics company focused on enterprise and ISP security and intelligence solutions.

CI-CERT

CI-CERT

CI-CERT is the national Computer Incident Response Team for Cote d'Ivoire.

Uleska

Uleska

Uleska is a scalable platform that provides automated and continuous software security testing whilst translating cyber risk.

CSIRT Italia

CSIRT Italia

CSIRT Italia is the national Computer Security Incident Response Team for Italy.

Department of Justice - Office of Cybercrime (DOJ-OOC) - Philippines

Department of Justice - Office of Cybercrime (DOJ-OOC) - Philippines

The Office of Cybercrime within the Philippines Department of Justice is the Central Authority in all matters relating to international mutual assistance and extradition for cybercrime.

Elron Ventures

Elron Ventures

Elron partner with early stage ventures to build companies that transform lives and industries. Our main areas of focus are enterprise software, cybersecurity, and healthcare.

Berezha Security Group (BSG)

Berezha Security Group (BSG)

BSG is a cybersecurity consulting firm specializing in all aspects of application security and penetration testing.

Advantage

Advantage

Advantage exists to provide peace of mind in an evolving technology reliant world. We were created by visionaries who for nearly 4-decades have been passionate about providing world-class solutions.

QA Consultants

QA Consultants

QA Consultants is North America’s largest software quality engineering services firm, an award-winning onshore provider of software testing and quality assurance solutions.

Gorilla Technology Group

Gorilla Technology Group

Gorilla specializes in video analytics, OT network security and big data to support a wide range of solutions for commercial, industrial, cities and government purposes.

CODA Intelligence

CODA Intelligence

CODA's AI-powered attack surface management platform helps you sort out the important remediations needed in order to avoid exploits on your systems.

Vivid Computing Solutions

Vivid Computing Solutions

At Vivid Computing Solutions we provide comprehensive solutions that keep your business running efficiently and securely.

Shieldworkz

Shieldworkz

Shieldworkz secure Operational Technology environments and protect businesses with best-in-class professional services and cyber security solutions.