News

2015-05-07

Cybersecurity Policies for the Insurance Industry

US NAIC holds the first large scale multi-state examination of insurers' cybersecurity practices.

2015-05-04

US Defense Secretary Defines New Cybersecurity Strategy

US Department of Defense's new cybersecurity strategy includes a "renewed partnership" with the technology industry.

2015-05-04

Banking on A Spy: GCHQ Chief to Fight Bank Cybercrime

Standard Chartered Hire New Security Chief From GCHQ.

2015-05-04

US Is Still the Biggest Source of Surging Malware Attacks

A majority of the cyber attacks on US companies originate from inside the country rather than from the outside.

2015-05-07

How To Hack a Military Drone

Now hackers have a manual for breaking into unmanned systems.

2015-05-01

Will Cyber Insurance Providers Reward Good Security?

There are three key factors that will drive demand for cyber insurance products.

2015-05-11

Hacked. Or, How to Become a Four-Star General

"Someone hacked into the Department of Defense [DoD] network," Gen. Keith Alexander

2015-05-01

Disapproved: UK College of Policing Blacklists Former Officers for Data Misdeeds

How effective are the British police at investigating internal misconduct?

2015-05-04

Is Germany Paranoid About US Spying ?

The idea of personal data privacy is deeply ingrained in German culture & recent events have deepened suspicions about the US.

2015-05-04

Germany Spied on EU Officials for the US

Germany's BND foreign intelligence agency helped the National Security Agency (NSA) carry out "political espionage".

2015-05-04

Is the US - Iran Cyber War Over?

Washington and Tehran may have come to an understanding on nuclear weapons but will the cyberwar go on?

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Phoenix TS

Phoenix TS

Phoenix TS offers world-class management, computer, and IT security certification training courses.

SolarWinds

SolarWinds

SolarWinds as a worldwide leader in solutions for network and IT service management, application performance, and managed services.

IPVanish

IPVanish

IPVanish has its roots in over 15 years of network management, IP services, and content delivery services. Now we're bringing these finely honed skills to VPN.

KELA

KELA

KELA's powerful cybercrime intelligence platform uncovers and neutralizes the most relevant cybersecurity threats coming from the hardest-to-reach places on the internet.

ESG Elektroniksystem- und Logistik-GmbH

ESG Elektroniksystem- und Logistik-GmbH

ESG offer a comprehensive portfolio of cyber and IT services ranging from consulting, solutions and operations to testing, simulation and training.

Blue Ridge Networks

Blue Ridge Networks

Blue Ridge offers a suite of solutions that enable secure remote access to the enterprise network with protection and control of endpoints.

MonsterCloud

MonsterCloud

MonsterCloud is a leader in managed cyber security services. Our cyber security team constantly monitors and protects businesses from cyber threats.

GeoLang

GeoLang

GeoLang’s Ascema platform protects sensitive information at the content level by identifying, classifying and tracking data across the corporate infrastructure.

Vector InfoTech

Vector InfoTech

Vector InfoTech is a leader in Industrial Security, Networks, IT and Telecommunications.

Redshift Consulting

Redshift Consulting

Redshift is an information management and information security consulting company offering a full range of services from infrastructure design to security assessments and network monitoring.

Scantist

Scantist

Scantist is a cyber-security spin-off from Nanyang Technological University (Singapore) which leverages its expertise to provide vulnerability management solutions to enterprise clients.

UKsec: Virtual Cyber Security Summit

UKsec: Virtual Cyber Security Summit

Join 100s of UK Cyber Security Leaders Online for Expert Cyber Security Talks, Strategy Insights, Cyber Resilience Tips and More.

PreEmptive Solutions

PreEmptive Solutions

PreEmptive Protection hit the sweet spot between cost, convenience and functionality by helping you protect and secure your apps in a smarter way.

Liminal

Liminal

Liminal is a boutique strategy advisory firm serving digital identity, fintech, and cybersecurity clients, and the private equity / venture capital community.

IntelliBridge

IntelliBridge

IntelliBridge supports our nation’s most critical missions by solving complex technology, intelligence, and mission support challenges.

AVIANET

AVIANET

AVIANET's goal is to empower enterprises and corporations worldwide and manage their digital transformation journey with confidence.