News

2017-09-18

Which Countries Are Ready For Cyberwar?

Including the usual suspects, over 30 countries are developing offensive cyber-attack capabilities, although their programmes are shrouded in secrecy.

2017-09-18

S. Africa’s Model For Cybesecurity

S. African organisations can no longer afford to operate in isolation in the process era of the 4th Industrial Revolution.

2017-09-15

Cyberwar: A Guide

At its core, cyber warfare is the use of digital attacks by one country to disrupt the computer systems of another to create significant destruction.

2017-09-13

Millions of Instagram Users Hacked

Claims that six million Instagram accounts have been hacked and 'Facebook/Instagram has not yet fully understood the full scope of the exploit'.

2017-09-12

US Conducts Computer War Games in Response to North Korea Missile Launch

The US military and Pacific allies conduct air drills over the Korean peninsula in conjunction with computer attack simulations.

2017-09-12

Disastrous Equifax Breach Exposes 44% Of The US Population

Executives run for cover as credit reporting giant Equifax loses the confidential data of 143m users to criminal hackers.

2017-09-14

US Military Fighting ISIS In Cyberspace

No terrorist group has capitalised on networked technology more than ISIS, both for recruitment messaging and commanding fighters on the ground.

2017-09-14

New AI Claims To Determine If You Are Gay Or Straight.

Hard To Believe: Artificial Intelligence can accurately guess whether people are gay or straight, based on photos of their faces.

2017-09-12

How Dangerous Is ISIS In The Cyber Domain?

ISIS has a wide range of commercial technological capabilities and knows how to use the power of social media to conduct global operations.

2017-09-11

Will Cyber Warfare Remove Kim From N. Korea?

Military invasion. Sending in a hit squad. Tougher sanctions. Maybe there is a safer route to deposing the renegade N Korean leader.

2017-09-07

Will GDPR Protect Privacy Or Just Lead To More Hacks?

Implementation of the new EU Data Protection Regulations will create some unintended and possibly unwelcome consequences.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Information Security Forum (ISF)

Information Security Forum (ISF)

The ISF is a leading authority on information security and risk management.

Quantivate

Quantivate

Quantivate is a provider of web-based Governance, Risk, and Compliance (GRC) software and service solutions.

Ground Labs

Ground Labs

Ground Labs is a security software company dedicated to making sensitive data discovery products that help organisations prevent sensitive data loss.

Cyber Akademie (CAk)

Cyber Akademie (CAk)

Cyber Akademie is a training and education center providing high-quality training and information events on information security and data protection.

Cyber Security Research Centre - University of Cardiff

Cyber Security Research Centre - University of Cardiff

Cardiff University's Centre for Cyber Security Research is a leading UK academic research unit for cyber security analytics.

CryptoCodex

CryptoCodex

Cryptocodex has developed Counter-Fight, the most advanced, yet simple to implement, counterfeit detection system.

Irdeto

Irdeto

Irdeto is the world leader in digital platform security, protecting platforms and applications for media & entertainment, gaming, connected transport and IoT connected industries.

SAST

SAST

SAST provide Static Application Security Testing as a service based on SAST Tools.

archTIS

archTIS

archTIS specialises in the design and development of products, solutions and services for secure information sharing and collaboration.

Cypherix

Cypherix

Cypherix is tightly focused on cryptography and data security. We leverage our expertise to deliver state-of-the-art, world-class encryption software packages.

Integris

Integris

Integris offers best-in-class services like dedicated vCIOs, specialized security and compliance advisory services, a 24/7 help desk, and more.

Star Lab

Star Lab

Star Lab specializes in the development and productization of embedded security technologies.

Robust Intelligence

Robust Intelligence

Robust Intelligence enables enterprises to secure their AI transformation with an automated solution to protect against security and safety threats.

Viatel Technology Group

Viatel Technology Group

Viatel Technology Group is a complete digital services provider. We have over 26 years’ experience delivering fully managed security, networking, cloud and communications services.

National Cybersecurity Competence Center (NC3) - Luxembourg

National Cybersecurity Competence Center (NC3) - Luxembourg

The purpose of the is to strengthen the Country's ecosystem facing cyber Luxembourg National Cybersecurity Competence Centerthreats and risks.

Anagram

Anagram

Anagram is the world’s first human-driven security awareness training platform that delivers real results.