News

2019-09-04

Easy Cyber Knowledge Chapter 3 - Social Media & Social Change

A revolution is taking place that will significantly change us as individuals, the way we live and our engagement with others. By Alfred Rolington

2019-09-03

Proactivity Is Key To Effective Cybersecurity

Decision-makers need to plan for the worst and know what to do when an incident occurs.

2019-09-03

Maritime Shipping Is Badly Exposed

Ships at sea are operating without effective cyber security measures in place, exposing critical vessel control systems to vulnerabilities.

2019-09-03

Extra-Terrestrial Hacking

NASA is reportedly investigating one of its astronauts in a case that appears to involve the first allegations of criminal hacking from space.

2019-09-04

Seven Cybersecurity Issues That Easily Go Unnoticed

Some cybersecurity issues and challenges can be harder to spot than others and it can lead to problems going unnoticed. By Chester Avey

2019-09-02

One $Million Stolen Every Minute

Every 60 seconds, 1,861 people in the USA are hit by cyber crimes and some states are much more risky than others. Alaska is a real hot spot.

2019-09-02

Five Features Of The Changing Threat Landscape

Organisations and critical infrastructure are likely to experience far more-destructive cyber-attacks, according to Accenture's 2019 Threat Report.

2019-09-02

Cyber Weapons Could Create Devastation Comparable To A Nuclear Strike

Cyber threats could be just as dangerous as a nuclear conflict, yet this is little understood by some governments and the public at large.

2019-09-02

A Major Breach In Biometrics Security Database

BioStar: Over a million fingerprints and other sensitive data including unencrypted usernames and passwords have been found exposed online.

2019-08-30

US Cyber Attack Disabled Iran’s Ability To Target Shipping

A strike by US CyberCommand has disabled a critical Iranian intelligence database, diminishing their ability to conduct covert attacks.

2019-08-30

One in Four Workers Would Steal Company Information

A quarter of IT employees surveyed say they would take company information to help apply for a job with a competitor.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Celestix Networks

Celestix Networks

Celestix is a global provider of secure network solutions that enable the simple deployment of secure remote access connectivity.

Echelon

Echelon

Echelon Company is a provider of information security services specializing in certification of security software and hardware products in Russia.

Alarum Technologies

Alarum Technologies

Alarum Technologies (formerly Safe-T) is a global provider of cyber security and privacy solutions to consumers and enterprises.

ACI Worldwide

ACI Worldwide

ACI Worldwide powers electronic payments for more than 5,000 organizations around the world.

EmergIn Risk

EmergIn Risk

EmergIn Risk specializes in providing innovative insurance solutions for the global marketplace including solutions for complex Cyber Risks.

Protectimus

Protectimus

Affordable two factor authentication (2FA) provider. Protect your data from theft with multi factor authentication service from Protectimus.

Visual Guard

Visual Guard

Visual Guard is a modular solution covering most application security requirements, from application-level security systems to Corporate Identity and Access Management Solutions.

AVeS Cyber Security

AVeS Cyber Security

AVeS combines expert knowledge and services with leading technology products to provide comprehensive Information Security and Advanced IT Infrastructure solutions.

Center for Research on Scientific & Technical Information (CERIST)

Center for Research on Scientific & Technical Information (CERIST)

CERIST is a scientific and technical research centre with activities focused in the area of networks, information systems and IT security.

Hack The Box

Hack The Box

Hack The Box is an online platform allowing you to test your penetration testing skills and exchange ideas and methodologies with thousands of people in the security field.

ECOMPLY

ECOMPLY

ECOMPLY is an all-in-one GDPR Compliance Solution. Efficient data protection management system for businesses and DPOsomply.

Banshie

Banshie

Banshie is an independent cyber security company with a small team of recognized specialist that are among the best in their field.

Symmetry Systems

Symmetry Systems

Symmetry Systems is a provider of data store and object-level security (DSOS) solutions that give organizations visibility into, and unified access control of, their most valuable data assets.

LayerX Security

LayerX Security

LayerX's user-first browser security platform turns any browser into the most protected & manageable workspace, by providing real-time monitoring and governance over users’ activities on the web.

Jot Digital

Jot Digital

Jot Digital is a full-service technology company specializing in digital engineering, application modernization and business transformation.

Mindflow

Mindflow

Mindflow is dedicated to bringing answers to the challenges the cybersecurity field and beyond face today.