News

2015-05-07

How To Hack a Military Drone

Now hackers have a manual for breaking into unmanned systems.

2015-05-01

Will Cyber Insurance Providers Reward Good Security?

There are three key factors that will drive demand for cyber insurance products.

2015-05-11

Hacked. Or, How to Become a Four-Star General

"Someone hacked into the Department of Defense [DoD] network," Gen. Keith Alexander

2015-05-01

Disapproved: UK College of Policing Blacklists Former Officers for Data Misdeeds

How effective are the British police at investigating internal misconduct?

2015-05-04

Is Germany Paranoid About US Spying ?

The idea of personal data privacy is deeply ingrained in German culture & recent events have deepened suspicions about the US.

2015-05-04

Germany Spied on EU Officials for the US

Germany's BND foreign intelligence agency helped the National Security Agency (NSA) carry out "political espionage".

2015-05-04

Is the US - Iran Cyber War Over?

Washington and Tehran may have come to an understanding on nuclear weapons but will the cyberwar go on?

2015-05-01

Forget Hackers, The Biggest Internet Security Threat Is Closer to Home

According to Verizon the biggest threat to your private information may actually be you!

2015-05-08

Stellar Wind: CIA analysts didn’t use the NSA’s Spy program.

CIA surveillance & bulk data collection program was so secretive that the agency was unable to make “full use” of its capabilities.

2015-05-06

France’s Intelligence Bill: legalising mass surveillance

The French government claims its new Intelligence Bill is defined in opposition to the American and British models – Is it really?

2015-04-28

Largest U.S. Data Breaches in the Last 10 Years

A Telling Infographic: In 2014 alone more than 900 million data records were lost or stolen.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

4ARMED

4ARMED

4ARMED services cover the end-to-end experience of securing modern software, from design and build through to deploy and test.

Cyber Threat Intelligence Network (CTIN)

Cyber Threat Intelligence Network (CTIN)

CTIN provides cyber threat intelligence services including training, platform evaluation, ISAC/ISAO systems development and counter botnet operations.

Sepio Cyber

Sepio Cyber

Sepio is the leading asset risk management platform that operates on asset existence rather than activity.

Redjack

Redjack

Redjack is a cutting-edge network analytics company focused on enterprise and ISP security and intelligence solutions.

Dual Layer IT Solutions (DLIT)

Dual Layer IT Solutions (DLIT)

Dual Layer offer a full range of IT Services and Solutions for businesses from IT infrastructure design to cloud/hosted solutions, cybersecurity, disaster recovery and IT training.

Vietnamese Security Network (VSEC)

Vietnamese Security Network (VSEC)

Vietnamese Security Network (VSEC) is an information security company providing website vulnerability scanning and monitoring services.

Guidehouse

Guidehouse

Guidehouse is a leading global provider of consulting services to the public and commercial markets with broad capabilities in management, technology, and risk consulting.

Valarian

Valarian

Valarian (formerly Worldr) is on a mission to build cutting-edge solutions that empower borderless collaboration in the new era of digital sovereignty.

NARIS

NARIS

NARIS is the leading provider of an integrated Governance, Risk and Compliance platform called NARIS GRC.

NCC-CSIRT (Nigerian Communications Commission)

NCC-CSIRT (Nigerian Communications Commission)

NCC has established a CSIRT for the telecommunication industry to provide services and support for the prevention and management of potential cyber security related emergencies.

Central Intelligence Agency (CIA) - USA

Central Intelligence Agency (CIA) - USA

The CIA is an independent agency responsible for providing national security intelligence to senior US policymakers. This includes cyber security related activities.

OSC Edge

OSC Edge

OSC was founded with the vision of providing expert solutions in IT to government and businesses. OSC Edge empowers organizations with solutions that prepare them for today and tomorrow.

OccamSec

OccamSec

OccamSec is a leading provider in the world of cybersecurity. We provide accurate, actionable information to reduce risk and enable better informed decisions.

Clango

Clango

Clango employs an identity-centric approach to optimizing your cybersecurity investment while minimizing risk.

Aurascape AI

Aurascape AI

Aurascape is working on advanced cybersecurity solutions powered by grounds-up generative AI architecture.

Digital Twin Consortium (DTC)

Digital Twin Consortium (DTC)

Digital Twin Consortium is a global ecosystem of users who are driving best practices for digital twin usage and defining requirements for new digital twin standards.