News

2015-07-30

Giant OPM Data Hack Did Blow U.S. Spies’ Cover

Not Just Social Security Numbers: more than one million fingerprints were stolen in U.S Federal Personnel data Hack.

2015-08-03

Don't Make These IT Mistakes in Your Organisation

Where dysfunctional rhythms and routines are the law of the land.

2015-08-06

Stagefright: New Android Vulnerability Dubbed 'heartbleed for mobile'

An attacker can take over the vast majority of Android phones with just a text message.

2015-08-03

Can You have Both Security & Privacy in the Internet Age?

Opinion By Anja Kaspersen: Head of Geopolitics & International Security at the World Economic Forum.

2015-07-29

Germany's New Infrastructure Cybersecurity Law

Federal agencies & providers of essential public services will have to comply with minimum standards of cyber-security.

2015-07-28

The BYOD Debate is Not Over

Most workers use personal mobile phones for work tasks, often outside of work hours.

2015-07-28

Hacking Team Inside Job

Italian police are investigating whether the attack on cyber-espionage firm Hacking Team could have been an inside job.

2015-07-28

Will Enforcing Encryption Backdoors Even Work?

Backdoors are “unworkable in practice, raise enormous legal and ethical questions & would undo progress on security...'

2015-07-30

Scientists Want to Keep AI Out of Weapons

Both Stephen Hawking & Steve Wozniak signed an open letter that begged leaders to stop a military robotics arms race.

2015-07-31

AI is as Dangerous as Nuclear Weapons

Leading computer scientists fear humanity might be 'driving off a cliff' with the rapid development of Artificial Intelligence.

2015-07-28

Cyber Threats to Civilian Flights

The emerging threat to commercial aviation today is vulnerability to cyber attack.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

RSA Security

RSA Security

RSA provide cybersecurity products for Threat Detection and Response, Identity and Access Management, Governance, Risk and Compliance, and Fraud Prevention.

Nexusguard

Nexusguard

Nexusguard is at the forefront of the fight against malicious Internet attacks, protecting organizations worldwide from threats to their websites, services, and reputations.

Magix Security

Magix Security

Magix Security assesses the cyber threat, gives you visibility of how vulnerable your business is to attack, and provides cybercrime detection and prevention services.

CTM360

CTM360

CTM360 is a unified external security platform offering 24x7x365 Cyber Threat Management for detecting and responding to cyber threats.

Securis

Securis

Securis provides organizations and agencies with the highest level of professional, ultra-secure data destruction and IT recycling.

Protocol Labs

Protocol Labs

Protocol Labs is a research, development, and deployment institution for improving Internet technology.

Nexum

Nexum

Nexum takes a comprehensive approach to security, from detecting and preventing network threats, to equipping you with the information, tools and training you need to effectively manage IT risk.

WolfSSL

WolfSSL

wolfSSL is an embedded SSL/TLS library providing secure communication for IoT, smart grid, connected home, routers, applications, games, phones, and more.

Stealth-ISS Group

Stealth-ISS Group

Stealth–ISS Group is your extended IT, cyber security, risk and compliance team, providing strategic guidance, engineering and audit services, along with technical remediation and security operations.

DeFY Security

DeFY Security

DeFY Security is a Cyber Security solutions provider with more than 20 years of experience securing financial institutions, healthcare, manufacturing and retail.

South West Cyber Resilience Centre (SWCRC)

South West Cyber Resilience Centre (SWCRC)

The South West Cyber Resilience Centre (SWCRC) is led by serving police officers, as part of a not-for-profit partnership with business and academia.

Sevco Security

Sevco Security

Sevco Delivers Real-time Asset Intelligence to Identify and Close Unknown Security Gaps.

Socura

Socura

Socura helps make the digital world a safer place; changing the way organisations think about cyber security through a dynamic, innovative, and human approach.

iTRUSTXForce

iTRUSTXForce

iTRUSTXForce is a global provider of DigitalX (cybersecurity, privacy, and digital trust) services. We offer comprehensive services that focus on delivering outcomes for our clients.

Vulnify

Vulnify

At Vulnify, we’re revolutionizing the way businesses identify and manage security vulnerabilities.

Exertis Cybersecurity

Exertis Cybersecurity

Exertis Cybersecurity is a sub-division of Exertis Enterprise. We provide market-leading cybersecurity solutions that help to address the cybersecurity challenges that organisations face today.