News

2019-09-17

Human Participation Lies Behind 99% Of Cyber Attacks

Only a tiny fraction of attacks target software and IT systems. The vast majority of cyber crime requires some level of human input to happen.

2019-09-19

Smart Technology In The Cyber-Age

We are on the edge of a new ‘cyber’ space age. This is how we make it a success. By Kristof Terryn

2019-09-17

Cyber Jobs And Professional Training

Cyber security is a brilliant career path, whether you're technical or not. Find out what are the skills, experience and qualifications you'll need.

2019-09-16

Using Blockchain Helps Secure Data Against Attacks

Strength In Numbers: To corrupt a blockchain, every system that processes it would have to be attacked, which could be thousands of systems.

2019-09-17

Smart Cities Call For Mobile Solutions

App-based physical security intelligence & access control technology that helps to build secure smart cities, campuses and perimeters.

2019-09-16

EU Crackdown On Cyber Crime

A new European regime will provide potentially powerful sanctions against cyber-criminals, both people & the organisations associated with them.

2019-09-16

US Power Grid Attack – No Harm Done. This Time

Hackers repeatedly attacked firewalls at multiple power generation sites operated by a "low-impact" operator but failed to cause any disruption.

2019-09-16

10 Predictions For The IoT Future

It’s not just about computers, laptops, tablets, and smartphones anymore. Now a multitude of devices are Internet-connected. What next?

2019-09-13

A Virtual Geospatial Fence On Network Access

Protection of IT networks requires a multi-layered approach that incorporates user training and security technologies, including Geo-fencing.

2019-09-12

AI Delivered Healthcare Creates Serious Legal & Ethical Issues

Use of Artificial Intelligence in medicine raises concerns over privacy, discrimination, psychological harm & doctor-patient relationships.

2019-09-12

WEBINAR: How to Secure App Pipelines in AWS

September 26 | Join SANS and AWS Marketplace to discuss how to improve security across the entire CI/CD pipeline and runtime environment.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Willis Towers Watson

Willis Towers Watson

Willis Towers Watson is a global risk management, insurance brokerage and advisory company. Services offered include Cyber Risks insurance.

Exabeam

Exabeam

Exabeam is a global cybersecurity leader that delivers AI-driven security operations.

Protiviti

Protiviti

Protiviti consulting solutions span critical business problems in technology, business process, analytics, risk, compliance, transactions and internal audit.

e-Crime Bureau

e-Crime Bureau

e-Crime Bureau is a specialized company offering cyber/computer forensics, cyber security consulting services, forensic audit and investigations services and training to clients across Africa.

IPQualityScore (IPQS)

IPQualityScore (IPQS)

IPQS anti-fraud tools provide a real-time fraud score to analyze how likely a user or visitor is to engage in fraudulent behavior.

FirstPoint

FirstPoint

FirstPoint has developed the market’s most advanced solution for securing cellular devices, including mobile phones and IoT products, by blocking malicious data leakage.

Quantstamp

Quantstamp

Quantstamp are experts in Smart Contract Security Audits. We provide verification that your decentralized system works as intended.

NetNordic Group

NetNordic Group

NetNordic is a Nordic system integrator focusing on solutions and services in the area of networking, smart data centers, cybersecurity, and unified communication.

PreCog Security

PreCog Security

PreCog Security is a US based cybersecurity risk mitigation company. We specialize in helping you find, minimize and manage vulnerability risk within your product, network and process.

Nostra

Nostra

Nostra are a next generation managed services provider with a constant focus on Security and Business Continuity.

blueAllianceIT

blueAllianceIT

blueAlliance IT is an investment and growth platform that unites local MSP and IT companies around the nation, helping them to grow and operate competitively.

Vaultinum

Vaultinum

Vaultinum are a trusted independent third party specialized in the protection and audit of digital assets.

Sonet.io

Sonet.io

Sonet.io is built for IT leaders that want a great experience for their remote workers, while enhancing security and observability.

Anetac

Anetac

Developed by seasoned cybersecurity experts, the Anetac Identity and Security Platform protects threat surface exploited via service accounts.

Oak9

Oak9

Oak9's Security as Code platform dynamically secures Infrastructure as Code (IaC) and deployed cloud workloads, automatically.

Arms Cyber

Arms Cyber

Arms Cyber is redefining ransomware defense with advanced solutions that stop attacks before they start.