News

2018-09-07

Hamas Turns To Instagram To Lure IDF Soldiers

New effort uncovered by Hamas to trick soldiers into downloading spyware onto their phones by befriending them on Instagram.

2018-09-05

Trump Relaxes US Cyber Attack Rules

The US administration is under pressure to deal with cyber-threats, amid growing concerns that state-sponsored hacks on critical infrastructure.

2018-09-05

How Blockchain Can Protect IoT Devices

IoT devices which are online all the time are especially vulnerable to cyberattack and could even be part of one. Blockchain can mitigate that.

2018-09-05

US Army Upgrades Cyber Protection Training

The US Army's cyber protection teams are upgrading their training program to include a real-life, round-the-clock, cyberattack on a city port.

2018-09-04

NATO Live-Fire Cyber Exercise

Locked Shields: With the cyber domain playing host to increased hostilities, NATO's readiness for attacks has never been more crucial.

2018-09-04

Cyber Insurance Has Distinctly Risky Characteristics

The danger of accumulation of cyber risks is a key concern for the insurance market, according to a study released by The Geneva Association.

2018-08-23

Catching The Silent Attacker, And The Next Phase Of Cyber AI

Lurking beneath the surface of enterprises today are subtle, stealthy cyber-threats – how can cyber AI fight back?

2018-09-04

Tomorrow’s Malware Will Attack When It Sees Your Face

AI may soon make malicious software nearly impossible to detect as it waits for just the right person to sit in front of the computer.

2018-09-03

Banks And Retailers Track How You Type, Swipe And Tap

To fight fraud, a growing number of banks and merchants are tracking visitors’ physical movements as they use websites and apps.

2018-09-03

Threat Posed By Satellite Systems

Satellite communications are vulnerable to hackers which, in the worst-case scenario, could turn satellite antennas into weapons.

2018-09-03

UK Police Fail To Take Digital Advantage

Embracing technology remains one of the biggest challenges facing UK police forces. It has already changed what criminals are able to do.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

F5 Networks

F5 Networks

F5 products ensure that network applications are always secure and perform the way they should—anywhere, any time, and on any device.

Cybernetica

Cybernetica

Cybernetica is an ICT company with activities in e-government, marine comms, data analysis and research in information security technologies.

Regulus Cyber

Regulus Cyber

Regulus enables drones, robots and autonomous vehicles to operate safely, without malicious or accidental interference to the operation of their mission.

Secret Double Octopus

Secret Double Octopus

Secret Double Octopus offers the world’s only keyless multi-shield authentication technology for users and things.

Cybersecurity Competence Center (C3)

Cybersecurity Competence Center (C3)

The Cybersecurity Competence Center was created to further strengthen the Luxembourg economy in the field of cybersecurity.

Baffin Bay Networks

Baffin Bay Networks

Baffin Bay Networks operates globally distributed Threat Protection Centers™, offering DDoS protection, Web Application Protection and Threat Inspection.

Blue Hexagon

Blue Hexagon

Blue Hexagon is a deep learning innovator focused on protecting organizations from cyberthreats.

Nardello & Co

Nardello & Co

Nardello & Co. is a global investigations firm with experienced professionals handling a broad range of issues including Digital Investigations & Cybersecurity.

National Academy of Cyber Security (NACS) - India

National Academy of Cyber Security (NACS) - India

National Academy of Cyber Security provides Professional Training Courses and Programmes in Cyber Security.

IGI Cybersecurity

IGI Cybersecurity

IGI Cybersecurity delivers people-driven cybersecurity for personalized, resilient cyber defense focused on individualized strategy and unshakeable partnership.

Aembit

Aembit

Aembit is the Identity Platform that lets DevOps and Security manage, enforce, and audit access between federated workloads

Circle Security

Circle Security

Circle’s breakthrough security API unifies solutions for identity and data security into one architecture and empowers organizations to secure their identity, data and privacy in their applications.

KCS Group Europe

KCS Group Europe

KCS Group helps its clients to identify and deal with any risks, weaknesses and threats which could impact on the business financially or reputationally.

Worksent Technologies

Worksent Technologies

Worksent is a Trusted white-label offshore support partner for MSPs and MSSPs.

RESTIV Technology

RESTIV Technology

RESTIV Compliance Copilot is your partner in continuous compliance. Real-time monitoring, continuous testing, and transparent evidence—no surprises, just peace of mind.

BlackSwan Technologies

BlackSwan Technologies

BlackSwan Technologies is reinventing enterprise software through Agile Intelligence for the Enterprise – a fusion of data, artificial intelligence, and cloud technologies.