FREE TO VIEW


« Back to News

2017-08-08

The Rise Of The Introvert: Is There An IT Personality?

Clichés about introverted personality types dominate jokes about the IT, security and espionage professions. Is there any truth in the stories?

2017-08-07

Briton Who Stopped WannaCry Arrested

"Accidental Hero" who found the hidden Wannacry killswitch is arrested by the FBI charged with writing malicious software targeting bank accounts.

2017-08-07

S. Korea Spy Agency Attempted To Rig Election

Electoral manipulation. Fake news. Surveillance of opposition politicians. That doesn't happen in mature democratic countries, does it?

2017-08-02

Cyber Criminals Target Your Text

A text message scam called "smishing" that can infect your smartphone and let thieves steal your personal information.

2017-08-02

Room At The Top For Women In Tech

It is possible for the tech industry, including data and analytics, to increase the number of C-suite women, even starting from a low base?

2017-08-02

Russian Arrested For $4billion Bitcoin Theft

The “internationally sought mastermind of a crime organisation” Alexander Vinnik is accused of laundering more than $4bn in bitcoin.

2017-08-08

North Korean Cyber 'tunneling' In New Zealand

NZ electronic security agents are investigating whether North Koreans are "tunnelling in" to New Zealand computer servers.

2017-08-10

Who Is Responsible for Cloud Security?

IT pros want to apply the same level of security to their cloud deployments as to internal resource and true cloud security requires a collaborative effort.

2017-08-11

Dangers Of Betting On Hybrid Cloud

Hybrid cloud’s popularity might prove to be a transitional stage, distracting companies from properly implementing data security.

2017-08-01

FBI Take Down Dark Web Drugs Traders

An international law enforcement effort has brought down two of the dark web’s largest marketplaces, AlphaBay and Hansa Market.

2017-08-08

What Will The Car Of 2040 Be Like?

The car of the future is still in flux with driver autonomy & powertrains in question; There are broadly two routes down which the car can wind to 2040.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Pluralsight

Pluralsight

Pluralsight helps enterprises build technology skills at scale with expert-authored courses on today’s most important technologies including information and cyber security.

International Association of Professional Security Consultants (IAPSC)

International Association of Professional Security Consultants (IAPSC)

Members of the IAPSC represent a unique group of respected, ethical and competent security consultants.

CompliancePoint

CompliancePoint

We design and implement strategies, processes & procedures to mitigate risk, reach compliance goals, protect data assets, and meet industry standards.

Romanian Association for Electronic Industry & Software (ARIES)

Romanian Association for Electronic Industry & Software (ARIES)

ARIES is the Romanian Association for Electronic Industry and Software, the biggest and most influental organization created for the IT&C industry in Romania.

Cyberra Legal Services (CLS)

Cyberra Legal Services (CLS)

Cyberra Legal Services provides cyber law advisory, cyber crime consultancy, cyber law compliance audit, cyber security, cyber forensics and cyber training services.

Synelixis Solutions

Synelixis Solutions

Synelixis Solutions is a high-tech company founded to provide complete telecommunications, networking, security, control and automation solutions.

Pentera Security

Pentera Security

Pentera (formerly Pcysys) is focused on the inside threat. Our automated penetration-testing platform mimics the hacker's attack - automating the discovery of vulnerabilities.

WidePoint

WidePoint

WidePoint Corporation is an innovative provider of Trusted Mobility Management (TM2) solutions.

LiveAction

LiveAction

LiveAction provides end-to-end visibility of network and application performance from a single pane of glass.

DeNexus

DeNexus

DeNexus is the leading provider of cyber risk modeling for industrial networks. Our Mission is to build the Global Standard for Industrial Cyber Risk Quantification.

In-Q-Tel (IQT)

In-Q-Tel (IQT)

IQT is the non-profit strategic investor that accelerates the development and delivery of cutting-edge technologies to U.S. government agencies that keep our nation safe.

V3 Cybersecurity

V3 Cybersecurity

V3 Cybersecurity is a unique company focused on contextualization of security programs from a business perspective. Our mission is to provide enterprise IT Risk Management capabilities.

Nukke

Nukke

Nukke offers advanced cybersecurity software and tailored solutions for your business.

SPIE Switzerland

SPIE Switzerland

SPIE Switzerland AG, a subsidiary of the SPIE Group, is a Swiss full-service provider of ICT, multi-technical and integral facility services.

BreachBits

BreachBits

BreachBits are on a mission to deliver world-class cyber risk insights continuously at scale in situations where knowing the true risk truly matters.

Nuke From Orbit

Nuke From Orbit

Nuke's mission is to put you back in control of your digital identity when your smartphone gets stolen.