News

2017-02-14

Police Using IoT To Detect Crime

Just the Beginning: A local US Police force is trying to access the records of an Amazon Echo device as evidence in a murder investigation.

2017-02-20

Malware Traders Switch To Less Suspicious File Types

After aggressively using JavaScript email attachments to distribute malware, attackers are now switching to less suspicious file types.

2017-03-20

Does Russia’s Election Meddling Break International Law?

US spies say Russia interfered in the US elections. Cyber warfare experts aren’t sure if that constitutes coercion by one state against another.

2017-03-17

Data Realities: 2017 & Beyond

Data Matters: A critical driving force in the global economy will be data exploitation, data value creation, data-sharing & data protection.

2017-03-17

Google's New AI System Unscrambles Pixelated Faces

Google reveals a new AI system capable of “enhancing” an eight-pixel square image, increasing the resolution x 16-fold to restore lost data.

2017-02-28

Tech Companies Oppose Trump’s Travel Ban

SpaceX and Tesla are the latest to join the ranks of technology firms officially opposing the migrant ban imposed by the President Trump

2017-03-16

US Changes Policy On International Cyber Regime

US says a UN cybersecurity group should stop working on new rules for online behavior & focus on governments sticking to the ones we have.

2017-03-16

Teaching Kids Cyber Skills

In some Israeli schools gifted children take after-school classes in encryption tactics, coding and how to stop malicious hacking.

2017-03-15

Engaging with the National Cyber Security Strategy:

Public Policy Exchange Conference: Working in Partnership to Reduce Risk in the Digital Age - London May 23rd

2017-02-28

Google Required To Pass Foreign Emails To FBI

A US judge has ordered Google to comply with FBI search warrants seeking customer emails stored outside the United States.

2017-03-15

AI Can Win At Poker But Who Is Overseeing Computer Ethics?

If machines are clever enough to beat humans at a game that requires intuition and deception as well as intelligence, then what else is possible?

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

International Association of Professional Security Consultants (IAPSC)

International Association of Professional Security Consultants (IAPSC)

Members of the IAPSC represent a unique group of respected, ethical and competent security consultants.

Azeti Networks

Azeti Networks

Azeti Networks is a global provider of IoT technology to a variety of verticals including telecomms, oil/gas, manufacturing, finance and healthcare.

Compass Security

Compass Security

Compass Security is a specialist IT Security consultancy firm based in Switzerland. Services include pentesting, security assessments, digital forensics and security training.

Corrata

Corrata

Corrata is an award-winning provider of mobile security and data control solutions for enterprises.

IT Security Jobs

IT Security Jobs

IT Security Jobs is a dedicated portal for everything related to IT professionals looking for IT Security jobs.

Fischer Identity

Fischer Identity

Fischer Identity provide identity & access management and identity governance administration solutions.

Iowa Cyber Hub

Iowa Cyber Hub

Iowa Cyber Hub is a cybersecurity education partnership between Iowa State University and Des Moines Area Community College.

SimSpace

SimSpace

SimSpace is the visionary yet practical platform for measuring how your security system responds under actual, sustained attack.

CIBR Warriors

CIBR Warriors

CIBR Warriors are a leading cyber security and networking staffing company that provides workforce solutions with businesses nationwide in the USA.

Inpher

Inpher

Inpher has pioneered cryptographic Secret Computing® that enables advanced analytics and machine learning while keeping data private, secure, and distributed.

Charles IT

Charles IT

Charles IT is your friendly, no-nonsense IT team focused on helping companies make their technology work for them. We focus on building relationships that deliver results.

SpireTec Solutions

SpireTec Solutions

SpireTec Solutions is an IT management training company offering 1500+ courses with state of art training facilities backed by a team of industry experts in various domains including cybersecurity.

Vancord

Vancord

Vancord is an information and security technology company that works in collaboration with clients to support their infrastructure and data security needs for today and tomorrow.

PCCW Global

PCCW Global

PCCW Global is a leading communications service provider, offering mobility, voice and data solutions to multinational enterprises, telecomms partners, cloud and application service providers.

StrongDM

StrongDM

StrongDM is the leader in Zero Trust Privileged Access Management (PAM).

Neural Defend

Neural Defend

Neural Defend is a deepfake detection technology with proprietary algorithms and an AI agentic multi-layered of solution.