FREE TO VIEW


« Back to News

2016-02-12

Snowden Leaks Spill Over Into The Courts

There is growing legal debate in the U.S. over the potentially invasive nature of big data cyber-surveillance tools.

2016-02-18

The White House Has A $19 Billion Cybersecurity Plan

Big Bucks: A broad Cybersecurity National Action Plan accompanying the 2017 budget will detail a massive crackdown on lax security,

2016-02-18

Protecting US Innovation From Cyberattack

U.S innovation and its dominance in the digital world gives it a competitive advantage in the global economy. Opinion by Barack Obama

2016-02-08

Security & Privacy Are Critical To Connected Cars

The automotive industry is rapidly evolving to transform the car from a simple mode of transport to a personalized information hub.

2016-02-08

Social Media Helped Create The Arab Spring, But Could Not Save It

Empowered by access to social media sites massive protests toppled Arab leaders, but it was as not a news path to democracy, merely a tool.

2016-02-08

New UK Cybersecurity Accelerator Program

A new UK program to support cyber security startups will help develop innovative technical solutions.

2016-02-11

3D Printing Transitions To 4D

3D printing is in itself a new technology and now researchers are taking it a step further by adding another dimension – time.

2016-02-10

What Is Human In The Age of Technology?

The evolutionary pressures surrounding machines are every bit as intense as in nature, and with few of its constraints.

2016-02-09

Active Cyber Defense Task Force

The US Center for Cyber and Homeland Security has launched a new project about active defense by the private sector against cyber threats.

2016-02-05

Who Needs A Computer Science Degree Anyway?

While they can’t necessarily replace a college degree, MOOCs are playing a key role in addressing the software development skills gap.

2016-02-12

EU Protects Online Data Quite Differently From The US

What control do you have over how companies collect & use your information? Different approaches in the US & EU have consequences.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Aqua Security Software

Aqua Security Software

Aqua Security helps enterprises secure their cloud native applications from development to production, whether they run using containers, serverless, or virtual machines.

Grimm Cyber

Grimm Cyber

GRIMM makes the world a more secure place by increasing the cyber resiliency of our client’s systems, networks, and products.

Cyber Triage

Cyber Triage

Cyber Triage is an automated incident response software any company can use to investigate their network alerts.

Caretower

Caretower

Caretower is one of Europe’s leading value added managed service provider in cyber security.

HudsonCyber

HudsonCyber

HudsonCyber, part of HudsonAnalytix, provides leading cyber risk management services for the global maritime transportation industry.

Zettaset

Zettaset

Zettaset’s XCrypt Data Encryption Platform delivers proven protection for Object, Relational/SQL, NoSQL, and Hadoop data stores…in the cloud and on-premises.

Wolfpack Information Risk

Wolfpack Information Risk

Wolfpack specialise in information and cyber threat management covering the full spectrum of prevention, detection, incident response and business resilience capabilities.

OEDIV SecuSys

OEDIV SecuSys

OEDIV SecuSys (formerly iSM Secu-Sys) develops high-quality IT software solutions, setting standards as a technology leader in the area of identity and access management.

Honeywell Process Solutions (HPS)

Honeywell Process Solutions (HPS)

Honeywell's Industrial Cyber Security Solutions help plants and critical infrastructure sectors defend the availability, reliability and safety of their industrial control systems.

Cyber Threat Defense (CT Defense)

Cyber Threat Defense (CT Defense)

CT Defense specialize in penetration testing and security assessments.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

iSPIRAL IT Solutions

iSPIRAL IT Solutions

iSPIRAL is a leading regulatory technology software provider delivering state-of-art AML, KYC, Risk and Compliance solutions.

Josef Ressel Centre for Intelligent & Secure Industrial Automation

Josef Ressel Centre for Intelligent & Secure Industrial Automation

The Josef Ressel Centre for Intelligent and Secure Industrial Automation investigates the fundamentals of digital assistants for industrial machines that enable intelligent and secure operation.

EasySec Solutions

EasySec Solutions

EasySec Solutions provides a cyber-security platform, based on a combination of the zero trust model and the software-defined security management.

St Fox

St Fox

St. Fox is a leading consultancy helping enterprises secure their Cloud, Data, endpoints, and applications.

Secomea

Secomea

Secomea redefines manufacturing plant security by combining internationally recognized industry best practices as critical components of our robust cybersecurity strategy.