News

2017-11-13

AI Can Guess Your Password

A new application of artificial intelligence & deep learning in information security focuses on more efficiently guessing passwords. It seems to work.

2017-11-02

Insurance Will Reduce Cyber Losses

The increasingly serious and large-scale nature of cyberattacks is creating problems for companies and clients of all sizes and on all levels.

2017-11-10

Russian Hacking Fuels Return To Paper Ballots

US regional election authorities are thinking of reversing the trend towards vulnerable electronic systems.

2017-10-24

News E-models For Quality Journalism

Wikipedia founder Jimmy Wales is embarking on a new online venture that the rest of us can only hope succeeds: Creating a new business model for quality journalism.

2017-11-06

Criminalised: Watching Terrorist Propaganda Online

Watching streamed extremist material online will be a criminal offence in Britain in plans to crackdown on terrorist propaganda.

2017-11-02

Phishing Is The Top Cyberattack Vector In 2017

Of all attack vectors, phishing remains the most commonly exploited, and accounts for 90% to 95% of all successful cyberattacks worldwide.

2017-11-02

Social Media & 21st-Century Warfare

Russia’s use of social media to influence the US elections demonstrates how warfare has moved away from the battlefield and toward the Internet.

2017-10-24

Cyber Criminals Threaten DDoS Attacks

… And email demands payment or criminals will take companies and their websites offline

2017-12-01

Social Media - 'Jargon-Busted'

A set of jargon-busting guides that teach children about their rights on social media sites has been published.

2017-11-13

Businesses Get Better At Detecting Insider Threats

The cybersecurity threat to companies from their own employees account for 42% of incidents and is growing.

2017-11-09

Russian Cyber Campaign Aims To Splinter US Voters

Thousands of Kremlin-linked Twitter accounts continue churning out material designed to splinter America along political, racial and religious lines.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Softtek

Softtek

Softtek helps its clients to gain a competitive edge by implementing digital solutions that propel their business strategies.

Kernelios

Kernelios

Kernelios is a simulator-based training center and an incubator for cyber experts worldwide.

Technology Industries of Finland (TIF)

Technology Industries of Finland (TIF)

Technology Industries of Finland (TIF) is a business and labour market lobbying organization that promotes the competitiveness and business conditions of Finland’s most crucial export industry.

Fox-IT

Fox-IT

Fox-IT prevents, solves and mitigates the most serious cyber threats with smart solutions for governmental bodies, defense, law enforcement, critical infrastructure, banking and large enterprises.

ESTsecurity

ESTsecurity

ESTsecurity is a leading company in cyber security providing intelligent security solutions to make world more secure.

Silicon:SAFE

Silicon:SAFE

Silicon:SAFE develops impenetrable hardware solutions that prevent bulk data theft during a cyber-attack.

Centro de Gestion de Incidentes Informaticos (CGII) - Bolivia

Centro de Gestion de Incidentes Informaticos (CGII) - Bolivia

CGII is the Computer Incident Management Center of the State of Bolivia.

ITRenew

ITRenew

ITRenew is a leading global IT lifecycle management solutions company, specializing in onsite data center decommissioning and data erasure services.

Consensys

Consensys

ConsenSys is a global blockchain company. We develop enterprise applications, invest in startups, build developer tools, and offer blockchain education.

The Cyber AB

The Cyber AB

The Cyber AB is the official accreditation body of the Cybersecurity Maturity Model Certification (CMMC) Ecosystem.

Cyber Range Malaysia

Cyber Range Malaysia

With Cyber Range Malaysia organizations can train their security professionals in empirically valid cyber war-gaming scenarios necessary to develop IT staff skills and instincts for defensive action.

SearchInform

SearchInform

SearchInform is a leading risk management product developer, protecting business and government institutions against data theft, harmful human behavior, compliance breaches and incomplete audit.

MedSec

MedSec

MedSec is the only company of its type focused solely on cybersecurity for hospitals and medical device manufacturers, offering both a cybersecurity software solution and consulting services.

Solvo

Solvo

Solvo enables security teams and other stakeholders to automatically uncover, prioritize, mitigate and remediate cloud infrastructure access risks.

Accelerynt

Accelerynt

Accelerynt was founded with a singular purpose: help teams like yours build cybersecurity resilience.

System Two Security

System Two Security

System Two Security automates detection engineering and threat hunting.