News

2017-07-05

Ukraine Police Trace Petya Attack Source

A vulnerability within an obscure piece of Ukrainian accounting software is the root cause of the massive Petya cyberattack.

2017-07-04

Cyberwar: A New Front For US Military

Cyber warfare is a game changer in how to assess enemies, meet their challenges and enact policies that match the growth of the cyber domain.

2017-07-03

Latest: All About Petya

The current Petya infestation spreads as rapidly and indiscriminately as WannaCry did, but it's better crafted and more dangerous.

2017-07-04

VR Systems Will Change US Navy Training

Virtual Reality and light detection technologies are about to change the way the US Navy prepares for war.

2017-07-03

Three Ways To Prepare Your Business For GDPR

The UK will apply the EU General Data Protection Regulation which comes into force next year on May 25th 2018. Get ready.

2017-07-03

Hacking A Chip With A Wave of Your Hand

Electro-magnetic fault injection hacking works and soon it will become important to protect electronic device components from non-invasive hacks.

2017-07-03

Ten Years Since The Outbreak Web War One

Estonia was the first victim of cyberwar and a decade later we are still grappling with the new era of increasingly sophisticated digital weapons.

2017-07-03

App Or Browser: Which Is Safer For Online Banking?

If you need to make a transaction on the go banking apps ought to be more secure than browsers, but it isn’t necessarily so.

2017-07-03

Urgent: Investment In NHS Cybersecurity

The Health Service in Scotland needs urgent investment to update legacy systems & preparedness.

2017-06-30

Petya Cyber Attack Update

“Petya” ransomware has caused serious disruption at large firms and paying the ransom does not work. Take defensive action.

2017-06-30

How A Nation Became Russia's Cyberwar Experiment

Blackout: In Ukraine, the quintessential cyberwar scenario has come to life.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ClearedJobs.Net

ClearedJobs.Net

ClearedJobs.Net is a career site and job fair company for professionals seeking careers in the defense, intelligence and cyber security communities.

Malta Information Technology Agency (MITA)

Malta Information Technology Agency (MITA)

MITA is the central driver of Government Information and Communications Technology (ICT) policy, programmes and initiatives in Malta.

Industrial Cyber-Physical Systems Center (iCyPhy)

Industrial Cyber-Physical Systems Center (iCyPhy)

The goal of iCyPhy is to conduct pre-competitive research on architectures and design, modeling, and analysis techniques for cyber-physical systems.

ISARA Corp

ISARA Corp

ISARA Corporation is a security solutions company specializing in creating class-defining quantum-safe cryptography for today's computing ecosystems.

Cask Government Services

Cask Government Services

Cask Government Services focuses on program management, cybersecurity, logistics, business analysis and engineering services for Federal, State and Local Government.

Barbara IoT

Barbara IoT

Barbara is an industrial device platform specifically designed for IoT deployments.

e-End

e-End

e-End provides hard drive shredding, degaussing and data destruction solutions validated by the highest electronic certifcations to keep you compliant with GLB, SOX, FACTA, FISMA, HIPAA, COPPA, ITAR.

Document Security Systems (DSS)

Document Security Systems (DSS)

DSS anti-counterfeit, authentication, and brand protection solutions are deployed to prevent attacks which threaten products, digital presence, financial instruments, and identification.

UMBRA

UMBRA

UMBRA is solely concerned with protecting governments against Nation State attacks. We are not a consumer or enterprise company.

Cybersecure Policy Exchange (CPX)

Cybersecure Policy Exchange (CPX)

Cybersecure Policy Exchange is a new initiative dedicated to advancing effective and innovative public policy in cybersecurity and digital privacy.

NewAE Technology

NewAE Technology

NewAE Technology is revolutionizing the hardware security market by making every engineer and designer aware of side-channel power analysis and glitching as important attack vectors.

Lavabit

Lavabit

Lavabit's Dark Internet Mail Environment is a secure, open-source, secure end-to-end communications platform for asynchronous messaging across the internet.

Circle Security

Circle Security

Circle’s breakthrough security API unifies solutions for identity and data security into one architecture and empowers organizations to secure their identity, data and privacy in their applications.

Sprocket Security

Sprocket Security

Sprocket Security protects your business by monitoring the cybersecurity landscape and performing continuous penetration testing services.

Stratsec

Stratsec

Stratsec is a global team of experts on a mission to protect human life, well-being and the environment against cyber-driven threats.

INETCO Systems

INETCO Systems

INETCO deliver essential real-time cybersecurity, payment fraud detection, operational monitoring and analytics solutions that empower our customers to grow their businesses without interruptions.