News

2015-06-23

FBI Unable to Monitor ISIS’s Encrypted Communications

The FBI has warned US lawmakers there was no way to monitor encrypted online communications.

2015-06-22

Cyberwar: Enter the Trolls

The OPM breach is a case of informational smash & grab. But operations to plant misinformation are important too.

2015-06-22

Top 6 Hacking Tools Security Teams Should Know About

Black Hat or White Hat: Here are the top 6 hacking tools that every security professional ought to know about.

2015-06-22

Cyber attack on German Parliament Still Active

A cyber attack on the Bundestag is still stealing data & could force it to spend millions of euros replacing the entire IT system.

2015-06-22

The Ever-evolving Cyber Threat to Planes

Professional hackers claim airline computer systems are riddled with weaknesses that allow a breach via the in-flight entertainment system.

2015-06-22

Cyber Insurers Won’t Cover Data Breach

Insurers can decline to pay out over inadequate cybersecurity.

2015-06-22

Paying for Non-Secrets

Information contained in the hacked OPM files needs to be treated like state secrets : Opinion by Ronald Marks

2015-06-22

Samsung Will Fix Security Hole in Galaxy Smartphones

Samsung will update the security software on its Galaxy smartphones after vulnerabilities exposed.

2015-06-21

Hackers Invade Hospital Networks

Hackers penetrate secure hospital networks, collecting valuable information, by targeting medical devices.

2015-06-21

Cybersecurity in the Boardroom

NYSE Survey: The biggest risks to security are human errors.

2015-06-21

Magnitude Exploit Kit Adobe Flash Player Vulnerability

An example of how cybercriminals rapidly take advantage of recently-patched vulnerabilities through exploit kits.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Infinigate UK

Infinigate UK

Infinigate is a value-added distributor of IT security solutions to protect and defend IT networks, servers, devices, data, applications, as well as the cloud.

Bayshore Networks

Bayshore Networks

Bayshore Networks was founded to safely and securely protect Industrial IoT (IIoT) networks, applications, machines and workers from cyber threats.

CyberSmart

CyberSmart

CyberSmart is a platform that allows you to maintain compliance, achieve certification and secure your organisation.

Paladion

Paladion

Paladion is a provider of managed IT security services.

US Cyber Command (USCYBERCOM)

US Cyber Command (USCYBERCOM)

USCYBERCOM conducts activities to ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.

Risk Ident

Risk Ident

RISK IDENT specializes in supporting enterprises in identifying and preventing criminal activity like payment fraud, account takeovers and identity theft.

Zeusmark

Zeusmark

Zeusmark are a digital brand security company. We enable companies to successfully defend their brands, revenue and consumers online.

Wiser Market

Wiser Market

Wiser Market is a leading company in global online brand protection services, intellectual property protection, anti-Counterfeit & trademark infringements.

Cypherix

Cypherix

Cypherix is tightly focused on cryptography and data security. We leverage our expertise to deliver state-of-the-art, world-class encryption software packages.

eSec Forte Technologies

eSec Forte Technologies

eSec Forte Technologies is a CMMi Level 3 certified Global Consulting and IT Security Services company.

Wabbi

Wabbi

Wabbi’s continuous security platform centralizes, automates and orchestrates security governance and vulnerability management to empower development teams to own appsec.

NPCERT

NPCERT

NPCERT is a team of Information Security experts formed to address the urgent need for the protection of national information and growing cybersecurity threat in Nepal.

ArmorPoint

ArmorPoint

ArmorPoint redefines the traditional approach to cybersecurity by combining network operations, security operations, and SIEM technology in one platform.

Somos

Somos

From voice to messaging to fraud prevention and beyond, Somos are committed to developing innovative solutions that ensure that our ability to maintain trustworthy connections never stops.

CODA Intelligence

CODA Intelligence

CODA's AI-powered attack surface management platform helps you sort out the important remediations needed in order to avoid exploits on your systems.

S4E (Security for Everyone)

S4E (Security for Everyone)

At S4E.io, our mission is to democratize digital security, making it accessible, simple, and effective for individuals and businesses of all sizes.