News

2017-02-16

The Limits Of Cyber Warfare

Future wars might be waged online, but evidence from recent fighting between Russia and Ukraine suggests it won't be that simple.

2017-02-15

WikiLeaks Wants A Database To Verify Twitter Users

After years of campaigning for transparency WikiLeaks now says it wants to build a surveillance database of it's own.

2017-02-15

Protecting Employees From Data Breaches

Businesses need to ramp up security, training, response and insurance tactics to respond to the insider threat of compromised employees.

2017-02-14

Non-Secure IoT Devices Are Powerful Weapons

The experts at ICIT think the future of IoT devices needs to be secured by designing in and embedding security features from the bottom up.

2017-02-14

Stolen Health Records Flooding Dark Web Markets

The large amount of stolen patient data posted for sale to the dark web in recent months has caused prices for most of those records to drop.

2017-02-13

Give Children More Control Of Data Privacy

The UK’s Children’s Commissioner is calling for stronger privacy settings for youngsters, amid fears their personal information is being exploited.

2017-02-13

Is The World On The Verge Of A Cyber War?

Some experts say a combination of geopolitical and strategic circumstances is leading to an inevitable State vs. State conflict in cyberspace.

2017-02-13

BYOD Security Is Critical For Business

The prevalence of bring-your-own-device culture in the corporate world means workers can be more productive & connected. More vulnerable, too.

2017-02-08

Tech Billionaires Give $20m For Artificial Intelligence Research

The founders of LinkedIn and eBay are donating a combined $20m to fund academic research aimed at ensuring the safety of AI.

2017-02-06

DARPA Working On Secure Data Sharing

DARPA is kicking off a project to create a new way to enable US troopsto securely send and receive sensitive information on their devices.

2017-02-08

Cyber Security Protection For Business

From encouraging a culture of caution, to backing up files, here's how SMEs can defend themselves against hacking threats.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

HackRead

HackRead

HackRead is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends.

Cortado Mobile Solutions

Cortado Mobile Solutions

Cortado Mobile Solutions is the manufacturer of the mobile device management solution Cortado MDM.

Janusnet

Janusnet

Janusnet develops software and solutions for organisations to enforce and manage data security.

Cyber Together

Cyber Together

Cyber Together is dedicated to advancing the cyber security industry by giving businesses access to Israel’s leaders, innovators and great minds in the field of cyber security.

Quorum Cyber

Quorum Cyber

Quorum Cyber offer end-to-end cyber security solutions, specialising in Managed Security Services, Consulting and Resourcing.

Taoglas

Taoglas

Taoglas Next Gen IoT Edge software provides a pay as you go platform for customers to connect, manage and maintain their edge devices in an efficient and secure way.

Ten Eleven Ventures

Ten Eleven Ventures

Ten Eleven is a specialized venture capital firm exclusively dedicated to helping cybersecurity companies thrive.

BrandShield

BrandShield

BrandShield is an anti-counterfeiting, anti-phishing and online brand protection solution.

Atomic Data

Atomic Data

Atomic Data is an on-demand, always-on, pay-as-you-go expert extension of your enterprise IT team and infrastructure.

SRG Security Resource Group

SRG Security Resource Group

SRG Security Resource Group is a Canadian company dedicated to providing world-class Physical and Cyber Security services.

HCS

HCS

HCS is an IT Company and Telecoms provider with an experienced team who are dedicated to ensuring our clients business systems are protected.

SecurityLoophole

SecurityLoophole

SecurityLoophole is an independent cyber security news platform with global coverage. Latest updates, reports, news and events related to cyber security.

Liquis Inc.

Liquis Inc.

Liquis, founded in 2002, is one of the largest facility decommissioning services companies in the U.S.

Denodo

Denodo

Denodo transforms the way organizations operate by unifying their data assets in real time and making data ubiquitous and secure to all users and business applications.

Pacific Certifications

Pacific Certifications

Pacific Certifications provide accredited certification, training and support services to help you improve processes, performance and products and services.

SGS Brightsight

SGS Brightsight

SGS Brightsight is the largest independent security evaluation lab in the world, with ten recognised labs worldwide.