News

2016-10-07

Secret Arrest Of A National Security Agency Contractor

FBI agents investigate theft and disclosure of highly classified NSA computer code developed to hack into the networks of foreign governments.

2016-10-06

Yahoo Secretly Scanned Emails For US Intelligence

Last year Yahoo secretly built a custom software program to search all incoming emails for specific information provided by US intelligence agents.

2016-10-05

Something To Hide? Apple Will Share Your iMessages With The Police

Apple promises that your iMessage conversations are safe and out of reach from anyone other than you and your friends. Really?

2016-10-12

Cyber Attacks Do More Damage Than Physical Attacks

Previous Head the US Dept. of Homeland Security thinks that digital attacks are now more dangerous & damaging than physical attacks.

2016-10-12

AI Is Replacing Human Made Decisions In The US Military

A new survey of existing weapon systems finds that AI is increasingly used to replace humans, not just helping them.

2016-10-10

UK Cyber Highway Will Improve Security

The proposed UK Cyber Highway will give organizations the power to take control online of the Cyber Essentials certification process.

2016-10-13

A New Front In The Business Of Political Espionage

The days of spies trying to get their hands on state and trade secrets are still alive and well today. Except, now they’re digital.

2016-10-11

Lawyers Beware: A Robot Will Take Your Job

Well-tuned search engines could save junior legal professionals a lot of time and suffering. But where does human intelligence come in?

2016-10-05

The Dilemma Of Predictive Policing

How Police authorities respond to information gathered using computer modelling is at least as important as the predictions themselves.

2016-10-14

The Self-Fulfilling Prophecy Of Intelligent Automation

Intelligent automation is going through a rapid democratisation and should no longer be seen as a nightmare of unpredictable, threatening robots.

2016-10-10

How Easy Would It Be To Hack Your Business?

The most important thing any firm can do to protect itself from hacks – both visual and cyber – is to change the way it thinks.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

VNCERT

VNCERT

VNCERT is the national Computer Emergency Response Team for Vietnam.

Wibu-Systems

Wibu-Systems

Wibu-Systems is a leading provider of solutions for the Digital Rights Management (DRM) and anti-piracy industry.

IdenTrust

IdenTrust

IdenTrust enables organizations to effectively manage the risks associated with identity authentication.

Lynxspring

Lynxspring

Lynxspring provides edge-to-enterprise solutions and IoT technology for intelligent buildings, energy management, equipment control and specialty machine-to-machine applications.

Forensic Pathways

Forensic Pathways

Forensic Pathways focus on the provision of digital forensic technologies, offering clients unique technologies in the management of mobile phone data, image analysis and ballistics analysis.

InsightCyber

InsightCyber

InsightCyber is on a mission to keep the world’s critical infrastructure, supply chains, and manufacturing operations cyber-safe, helping to prevent attacks that can have catastrophic impacts.

Spin Technology

Spin Technology

SpinOne is a SaaS data protection platform designed to monitor, secure, and back up your G Suite and O365 data, improve compliance, and reduce IT costs.

HB-Technologies

HB-Technologies

HB-Technologies is pioneer in Africa, in digital security, embedded electronic and IT solutions based on highly secure smart cards that comply with international standards and norms.

IT Acceleration

IT Acceleration

IT Acceleration is a full-service IT management and support, IT compliance and Digital Forensics company.

CornerStone

CornerStone

CornerStone is an award winning, independent risk, cyber and security consulting firm providing a range of Risk Management, Security Design and Implementation Management Services.

Vertex Cyber Security

Vertex Cyber Security

Vertex provide Cyber Security Services to small to large businesses including Advise, Consulting, Adding Security Partnership, Penetration Testing, ISO 27001-2 and Audits.

Veza Technologies

Veza Technologies

Veza is the authorization platform for data. Built for hybrid, multi-cloud environments, Veza enables organizations to manage and control who can and should take what action on what data.

Versent

Versent

Versent is an Australian-born technology company, focused on architecting, building & operating cloud native applications, data streams, platforms, and services.

runZero

runZero

runZero delivers the most complete security visibility possible, providing you the ultimate foundation for successfully managing exposures and compliance.

Harmonia Holdings Group

Harmonia Holdings Group

Harmonia Holdings Group was born in 2006 with the vision to bring innovation and change to the federal IT sector.

Styx Intelligence

Styx Intelligence

Styx Intelligence’s platform provides visibility and supports remediation against threats targeting your digital assets.