News

2016-12-02

Australia Goes To Cyberwar With Islamic State

Australia is using offensive cyber capabilities to fight Islamic State in the virtual world.

2016-12-02

War In The Information Age

In the information age of warfare, advantage will be achieved through the speed and integration of actionable data.

2016-12-01

Medical Devices Are The Weak Link

For many users of the OneTouch Ping insulin pump, the benefit of ease of use has been outweighed by the fear of hacking.

2016-11-30

UK National Cyber Security College Locates To Bletchley Park

The home of the Enigma codebreakers Bletchley Park is set to become the home of the UK’s first ever National College of Cyber Security.

2016-11-30

Facebook’s Secret Censorship Deal With China

Facebook has developed censorship software in an effort to get China to lift its seven-year ban on the world’s largest social network.

2016-11-30

From A Distance: Robot Remote Control

AI software and robotics-based hardware designed to achieve an exoskeleton that can mimic human movements from long distance.

2016-11-30

US Navy Personnel Data Breached

The US Navy is investigating a data breach after personal information of more than 130,000 sailors was accessed.

2016-11-30

Jihadi Cybercrime

Islamic State inspired websites & social media outlets don't just promote Jihad. They also teach cybercrime techniques.

2016-11-30

Malware Makes ATMs 'spit cash'

Malicious software used by the gang known as Buhtrap has been hacking Russian bank cash machines and is coming this way soon.

2016-11-29

Can Snowden Testify in Berlin?

Political Manoeuvers: Opposition parties seek legal protection for Edward Snowden to address German Parliamentarians.

2016-11-29

CIA Chief - Trump Picks Pompeo

CIA Director-designate Mike Pompeo has supported NSA surveillance programs and criticised Silicon Valley's stance on encryption.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clearwater Security & Compliance

Clearwater Security & Compliance

Clearwater Compliance specialize in Privacy, Security, Compliance and Risk Management Solutions for Health Care, Law Firms and other businesses.

BGD E-GOV CIRT

BGD E-GOV CIRT

BGD e-GOV CIRT's mission is to support government efforts to develop ICT programs by establishing incident management capabilities within Bangladesh.

Crosscheck Networks

Crosscheck Networks

Crosscheck products allow you to test your APIs across different protocols and message formats with functional automation, performance, and security testing capabilities.

Spherical Defense

Spherical Defense

Spherical Defense offers an alternative approach to WAFs and first generation API security tools.

Wüpper Management Consulting (WMC)

Wüpper Management Consulting (WMC)

Specialized in compliance, risk management and holistic information security WMC GmbH has longtime implementation experience in global projects.

Phosphorus Cybersecurity

Phosphorus Cybersecurity

Phosphorus has fully automated remediation of the two biggest IoT vulnerabilities, out of date firmware and default credentials.

RealCISO

RealCISO

RealCISO is a CISO grade cloud platform to help companies understand, manage, and mitigate their cyber risk.

xMatters

xMatters

xMatters is a digital service availability platform that helps enterprises prevent, manage, and resolve IT incidents before they can become business problems.

Privacy Compliance Hub

Privacy Compliance Hub

Privacy Compliance Hub provide an easy to use platform with a comprehensive data protection compliance programme including training, information, templates and reporting.

Nuts Technologies

Nuts Technologies

Nuts Technologies are simplifying data privacy and encryption with our innovative and novel data containers we call nuts based on our Zero Trust Data framework.

Vaultinum

Vaultinum

Vaultinum are a trusted independent third party specialized in the protection and audit of digital assets.

Vercara

Vercara

Vercara offers a purpose-built, global cloud security platform that provides layers of protection to safeguard businesses’ online presence, no matter where an attack comes from or where it is aimed.

Radix Technologies

Radix Technologies

Radix offer end-to-end device management solutions, consolidating all the organization devices, processes and stakeholders into one easy-to-use management platform.

Frenos

Frenos

The Frenos Platform helps enterprises understand their most probable attack paths while highlighting the most effective risk mitigations to deter and defend against today’s adversaries.

SteelGate

SteelGate

SteelGate’s core capabilities are centered around architecture design and engineering of network, systems, and cybersecurity solutions.

7AI

7AI

7AI is the first agentic security platform that harnesses the speed, swarming capabilities, and power of AI to finally give defenders the advantage over evolving threats.