News

2017-03-01

Bitcoin Is Increasing Ransom Attacks

There are a few good reasons to use Bitcoin: It’s global, private and won’t bulk up your wallet. But there’s another more sinister perk.

2017-02-21

Queen opens Centre to protect against Attacks

The Queen was shown how hackers could target the UK's electricity supply as she opened a centre to protect the nation from cyber-attacks.

2017-05-01

Dell Says Security Is Plaguing Business

Michael Dell: Security is not a technology problem, but a business problem.

2017-02-21

Murderer's girlfriend got Police job to access files

A woman who got a job at UK’s Hammersmith Police station so she could data track a witness whose evidence helped convict her gangster boyfriend of murder has been jailed.

2017-04-11

AI Art - Electronic Rembrandt Creation

Dutch Master: Replicating Rembrandt's artistic techniques to re-create a famous masterpiece using software and a 3-D Printer.

2017-04-05

The Cusp Of Merging Human With Machine

We are at the point where computers and machines are no longer going to be simply tools. Computers are becoming, literally, part of us.

2017-02-21

Hackers targeted Banks and 100 organisations

Malware attacks that recently put the Polish banking sector on alert were part of a larger campaign that targeted financial organisations from more than 30 countries.

2017-04-01

Make The Most Of Data Analytics

Top Tips for HR on improving workforce diversity using Data Anayltics.

2017-02-21

Russian Hackers using new Viruses for Attacks

State-sponsored Russian hackers are using a new type of virus designed to attack critical Ukrainian infrastructure such as the power grid and financial system, a senior Ukrainian state security official said recently.

2017-02-21

Guide To The Internet of Things

You’ve likely heard the phrase Internet of Things, or IoT, at some point if you have been following any tech news in the last several years.

2017-03-28

Hamas Upgrades Cyber Espionage Capability

Non-state political groups like Hamas have developed state-like hacking, espionage and surveillance capabilities.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Duane Morris LLP

Duane Morris LLP

Duane Morris is a global law firm with offices in the USA, UK and Asia. Practice areas include Cybersecurity.

I-Tracing

I-Tracing

I-TRACING are experts in IT security, specialized in legal compliance of information systems, security of information systems, and the collection of digital evidence and traces.

BSA - The Software Alliance

BSA - The Software Alliance

BSA is the leading advocate for the global software industry before governments and in the international marketplace.

CamCERT

CamCERT

CamCERT is the national Computer Emergency Response Team for Cambodia.

National Institute of Information and Communications Technology (NICT)

National Institute of Information and Communications Technology (NICT)

NICT is Japan’s sole National Research and Development Agency specializing in the field of information and communications technology.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Tenfold Software

Tenfold Software

Tenfold is the unique, centralized platform for managing user and permissions efficiently and automatically.

Langner

Langner

Langner is a software and consulting firm specialized in cyber security for critical infrastructure and large-scale manufacturing.

Crayonic

Crayonic

Crayonic digital identity technologies protect and guarantee the identity of people and things.

Jerusalem Venture Partners (JVP)

Jerusalem Venture Partners (JVP)

JVP’s Center of Excellence in Be’er Sheva aims to identify, nurture and build the next wave of cyber security and big data companies to emerge out of Israel.

ZecOps

ZecOps

ZecOps is a cybersecurity automation company offering solutions for servers, endpoints, mobile devices, and custom devices.

YesWeHack

YesWeHack

YesWeHack offers companies an innovative approach to cybersecurity with Bug Bounty (pay-per-vulnerability discovered) to identify and report vulnerabilities in their systems.

Cybeta

Cybeta

Cybeta's actionable cybersecurity intelligence keeps your business safe with strategic and operational security recommendations that prevent breaches.

Audea

Audea

Audea is a consultancy firm specialising in cybersecurity, risk and compliance. We provide professional services addressing all areas of Cybersecurity and GRC.

Ronet Cyber Security

Ronet Cyber Security

Ronet Cyber Security offers crypto forensics services for regulators, law enforcement, companies and individuals to ensure that your transactions are safe and secure.

Academia the Technology Group

Academia the Technology Group

Academia specialise in the supply of software, IT hardware, training and service solutions to the public sectors, business and pro media markets.