News

2016-09-08

The Hack That Could Swing The US Election

Stolen Data & Vulnerable Voting Machines: Might hackers have a material impact on the 2016 Presidential race?

2016-09-15

Cybercrime Isn't The Reason Why Cash Remains King

The "cashless" world has proven unreliable in several ways and technology is actually supporting cash in many instances.

2016-09-21

WiFi Can Spy On You

City dwellers spend nearly every moment of every day awash in Wi-Fi signals and they can be used to monitor people in surprisingly detailed ways.

2016-09-22

Cybersecurity in Aviation

It’s no secret that the rise of the Internet of Things (IoT) introduces a host of new cybersecurity challenges and vulnerabilities for aircraft.

2016-09-13

Facebook, Twitter and Google Are A 'recruiting platform for terrorism''

The Social Network: Facebook, Twitter & Google are deliberately failing to stop terrorists using their websites to promote terror say British MPs.

2016-09-08

Hedge Fund Robot Outsmarts Master

Using artificial intelligence to look for meaningful patterns in the world’s data, then using these insights to create investment strategies.

2016-09-16

French Submarine Builder Admits Data-Warfare Breach

French submarine maker DCNS recently claimed it was the victim of economic warfare after theft of highly detailed information on its Scorpene vessel.

2016-08-30

For Russian journalists fighting hacks is part of the job

When news emerged that Kremlin-linked hackers attempted to breach The NYT Moscow bureau, it probably didn't surprise many Russian journalists

2016-08-30

Russian Cyber Spies & Hackers Are The New Normal

Time to set cyber espionage 'norms' before more volatile nation-states follow suit, experts say.

2016-09-20

The Cyber War Winter Has Arrived

Is the world at the edge of a balancing act that is tipping toward the world’s first war fought online?

2016-08-30

High Resolution Cameras to Iraq

Iraq is to acquire the ScanEagle drone surveillance system to help suppress Islamic State.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Corero Network Security

Corero Network Security

Corero Network Security is dedicated to improving the security of the Internet through the deployment of its innovative DDoS & Network Security Solutions.

FIDO Alliance

FIDO Alliance

FIDO Alliance is a non-profit organization formed to address the lack of interoperability among strong authentication devices.

Preempt Security

Preempt Security

The Preempt Platform delivers adaptive threat prevention that continuously preempts threats based on identity, behavior and risk.

Secure Decisions

Secure Decisions

Secure Decisions focus on research and product development related to national security including information assurance, computer network defense, cyber security education, and application security.

miniOrange

miniOrange

miniOrange is a cloud and on-premise based identity and access management (IAM) solution provider.

CMMI Institute

CMMI Institute

CMMI Institute enables organizations to elevate and benchmark performance across a range of critical business capabilities, including product development, data management and cybersecurity.

German Israeli Partnership Accelerator (GIPA)

German Israeli Partnership Accelerator (GIPA)

GIPA is based on two pillars: it is an incubator aimed at young academics and a program to transfer cybersecurity expertise to corporate partners.

Have I Been Pwned (HIBP)

Have I Been Pwned (HIBP)

Have I Been Pwned is a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or "pwned" in a data breach.

Kriptos

Kriptos

Kriptos helps businesses improve their cybersecurity, risk, and compliance strategies by locating critical information through a technology that automatically classifies and labels documents using AI.

Creative ITC

Creative ITC

Creative ITC is a leading infrastructure and cloud enablement company. We design and deliver exceptional managed services and cloud solutions.

Approov

Approov

Approov provides a comprehensive runtime security solution for mobile apps and their APIs, unified across iOS and Android.

Arcserve

Arcserve

Defend your data with Arcserve all-in-one data protection and management solutions designed to be the right fit for your business, regardless of size or complexity.

iNovex

iNovex

iNovex is a community of innovators that work together to solve hard problems. We partner with you to meet problems head-on and push boundaries with technology solutions.

Eqlipse Technologies

Eqlipse Technologies

Eqlipse Technologies provides products and high-end engineering solutions to customers in the Department of Defense and Intelligence Community.

Knostic

Knostic

Knostic is an early stage startup developing a risk management and governance platform designed for enterprise large language models (LLM).

Verosint

Verosint

Verosint (formerly 443ID) provides real-time account fraud prevention that reveals fraudsters hiding in user accounts and proactively blocks them before their attacks can cause harm.