News

2015-12-02

Anonymous’ Cyberwar With ISIS And It’s Unintended Consequences.

Efforts to take down ISIS Web sites may have unintended security consequences for carefully planned law enforcement operations.

2015-12-02

Bitwalking: Digital Currency Pays People to Walk

Bitwalking dollars will be earned by walking, unlike other digital currencies such as Bitcoins that are "mined" by computers.

2015-12-02

Coinbase Shift Payments To Bitcoin Debit Card

A debit card integrating all your currencies, both real and virtual, together in one payment source.

2015-12-02

Cyber Security Firm Tanium Raises New Capital At $2.5billion Valuation

Investors see that what makes Tanium unique is its ability to detect and fix enterprise security threats quickly.

2015-12-04

Russian Financial Cybercrime

Russian cyber criminals have evolved and gained a reputation for sophisticated financial crime; it's top flight are believed to have stolen over $790m.

2015-12-02

Cyber Threat From Within

A rogue employee can do at least as much damage as a rogue nation.

2015-12-01

The Road to Measuring and Interpreting Big Data

Think tank Demos and market research firm Ipos MORI are taking a close look at social media using big data analytic methods.

2015-12-01

Former NSA Expert ‘We are in the Cyber War’

Security mechanisms cannot keep up with the threats that both state actors and non-state actors like Anonymous are producing.

2015-12-01

Presidential Candidate John McAfee Talks Cyber

When it comes to eccentric personalities and colorful pasts, Donald Trump has nothing on John McAfee.

2015-12-01

IoT Attacks and Evasion Will Characterize 2016

The Internet of Things along with predictions of new malicious tactics & strategies will create unique challenges in 2016.

2015-12-05

IBM's CEO On Hackers: 'Cyber Crime Is The Greatest Threat To Every Company In The World'

"... cyber crime, by definition, is the greatest threat to every profession, every industry, every company in the world.”

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Boxcryptor

Boxcryptor

Boxcryptor encrypts your sensitive files before uploading them to cloud storage services.

Cyber London (CyLon)

Cyber London (CyLon)

CyLon is a leading cyber security accelerator and seed investment programme. We help entrepreneurs from across the globe to build cyber security businesses, raise investment, and develop partnerships.

Kuratorium Sicheres Österreich (KSO)

Kuratorium Sicheres Österreich (KSO)

KSO is an independent non-profit association that has set itself the goal of making Austria safer as a national networking and information platform for topics of internal security.

Gigacycle

Gigacycle

Gigacycle is one of the leading IT disposal and recycling providers in the UK. We specialise in IT asset disposal (ITAD) and data destruction.

Newtech Recycyling

Newtech Recycyling

Newtech Recycyling specializes in the removal and disposal of IT infrastructure which has reached the end of its life cycle.

Cyber NYC

Cyber NYC

Cyber NYC is a suite of strategic investments to grow New York City’s cybersecurity workforce, help companies drive innovation, and build networks and community spaces.

Communications & Information Technology Regulatory Authority (CITRA)

Communications & Information Technology Regulatory Authority (CITRA)

CITRA is responsible for overseeing the telecommunications sector, monitoring and protecting the interests of users and service providers, and regulating the services of telecomms networks in Kuwait.

Citadel Cyber Security

Citadel Cyber Security

Citadel is a leading 'One Stop Shop' provider of consulting services in cyber and information security. Our experts operate in hundreds of business organizations in Israel and around the world.

GreenPages Technology Solutions

GreenPages Technology Solutions

GreenPages provide expert strategic guidance and proven cloud-era solutions for our clients. Every day we help organizations leverage the cloud securely with less risk and cost.

AFRY

AFRY

AFRY is a world leading engineering company, trusted as a supplier of services and solutions within the industry, energy, and infrastructure sectors as well as for authorities.

AKS iQ

AKS iQ

AKS iQ leads the RegTech sector with AI, automating regulatory compliance in the banking industry and ensuring paperless TBML and CFT adherence in finance.

Capzul

Capzul

Capzul are transforming the network security landscape with a new approach; creating virtually impenetrable networks, precluding cybercriminal attacks on your network ecosystem.

Intraframe US

Intraframe US

Intraframe US is a cybersecurity company in Memphis, specializing in Digital Forensics Incident Response and Managed IT services. We provide SMBs with a 24/7 SOC for proactive Cyber Threat Management.

INT3L

INT3L

The INT3L group (formerly Defentek) is a provider of national security and intelligence solutions, systems and services.

TENEX

TENEX

TENEX is a cybersecurity company leveraging advanced artificial intelligence and human expertise to transform enterprise security.

Tactic Lab

Tactic Lab

Tactic Lab is a group of cybersecurity experts and managed security services provider focused on offensive and defensive security.