News

2019-01-03

Beware Of Cyber Criminals Demanding Payments In Bitcoin

Cyber-crime syndicates have resorted to transactions using crypto currency or Bitcoin money to avoid detection by the authorities.

2018-12-28

The US Is Buying Phone Hacking Tools For Ghana’s Police

The US State Dept is purchasing phone hacking tools for the Ghanaian police to assist the with investigations into international crime.

2018-12-31

Audit Finds Cyber Vulnerabilities In US Missile Defense System

US armed forces have basic cybersecurity inadequacies that may allow adversaries to circumvent missile defense capabilities.

2018-12-24

Women In Cyber Take The Spotlight

Women are key to solving the workforce shortage, which is expected to reach 3.5 million open jobs by 2022.

2018-12-31

The NSA Is Spying On You Now

A look at eight methods the NSA is using to spy on you right now, according to documents leaked by Edward Snowden.

2018-12-28

Behind The White House’s Plan To Be More Aggressive In Cyberspace

America has encountered a new threat, and the US government needs a dedicated effort to respond to Russia’s hacking.

2018-12-28

10 Cyber Security Trends To Look Out For In 2019

2018 was an interesting year for all things cyber. So, what can we expect to see in 2019 then? Here are some things to consider.

2019-01-03

South African Cybercrime Is Advancing Fast

Cybercrime is surging worldwide, not least in S. Africa where security agencies, businesses and law enforcement are running hard to keep up.

2018-12-27

5G Mobile Technology Poses An Espionage Risk

Next generation 5G mobile internet promises much greater connectivity, but Canada's spy chief thinks it will facilitate state-sponsored espionage.

2018-12-27

The Fourth Industrial Revolution Built On Blockchain And AI

The need for Big Data analytics and the combination of AI and blockchain are key components of the Fourth Industrial Revolution.

2018-12-24

Social Media Outpaces Print Newspapers In The US

Social media sites have surpassed print newspapers as a news source for Americans.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

April 4, 2024 | 11:00 AM PT: Join this webinar to find out about six emerging trends dominating the cloud cybersecurity landscape.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DeviceLock

DeviceLock

DeviceLock is a leading provider of endpoint device/port control and data leak prevention software.

Continuum

Continuum

Continuum is the IT management platform company that allows Managed IT Services Providers to maintain and back up on-premise and cloud-based servers, desktops, mobile devices and other endpoints

Orange Cyberdefense

Orange Cyberdefense

Orange Cyberdefense is the expert cybersecurity business unit of the Orange Group, providing managed security, managed threat detection & response services to organizations around the globe.

Advanced Software Products Group (ASPG)

Advanced Software Products Group (ASPG)

ASPG offers a wide range of innovative mainframe software solutions for Data Security, Access Management, System Management and CICS productivity.

Securicon

Securicon

Securicon provides expert consulting for application, system and network security.

KLDiscovery

KLDiscovery

KLDiscovery is a global leader in delivering best-in-class eDiscovery, information governance and data recovery solutions.

Cryptovision

Cryptovision

cv cryptovision GmbH is one of the leading specialists for modern, user-friendly cryptography and solutions for secure electronic identities.

BELAC

BELAC

BELAC is the national accreditation body for Belgium.

Combined Selection Group (CSG)

Combined Selection Group (CSG)

CSG are Global Talent Experts, we operate across 7 specialist sectors, including Information Technology and Cybersecurity, and take a pro-active approach to executive search and headhunting.

Project Moore

Project Moore

Project Moore is an Amsterdam law firm specialising in IT-law and privacy.

AaDya

AaDya

AaDya provide smart, simple, affordable and effective cybersecurity software solutions for small and medium businesses.

Have I Been Pwned (HIBP)

Have I Been Pwned (HIBP)

Have I Been Pwned is a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or "pwned" in a data breach.

Softwerx

Softwerx

Softwerx is the UK’s leading Microsoft cloud security practice. We’ve been helping forward-thinking companies better secure their businesses for nearly twenty years.

Datapac

Datapac

Datapac is one of Ireland’s largest and most successful ICT solutions and services providers. We have been at the forefront of technology innovation in Ireland for the past three decades.

Orbis Cyber Security

Orbis Cyber Security

Orbis is one of the leading cybersecurity company in USA. Our cybersecurity specialist defends your data, combat threat, and modernize your compliance.