News

2016-09-21

How Will Terrorists Use The Internet of Things?

What is the future for the IoT, when smart refrigerators can be used in DDOS attacks and LED lightbulbs can communicate?

2016-09-21

Tesla Announces Update To Self-Driving System

Tesla is updating its semi-autonomous driving system Autopilot with new limits on hands-off driving.

2016-09-21

A New Autonomous Tactical Drone

No Pilot. No GPS: The drone flies into a building and autonomously maps its interior using cameras, lasers, inertial & ultrasonic sensors.

2016-09-20

Special Report: CEOs And IT Innovation (£)

SPECIAL REPORT: CEOs And IT Innovation Our CEO/CIO research exposes some of the significant transformation issues organisations are facing in the new Digital Economy.

2016-09-21

You Have Big Data, Or Perhaps Just Too Much Data?

There is more data available to organisations today than ever before. Is it all really useful?

2016-09-20

FBI: Don’t Pay Bitcoin Ransomware

The FBI has reversed its advice on paying ransomware. The agency now says people should refuse to pay bitcoin extortionists.

2016-09-20

Cloud-Based Malware Now Delivers Ransomware

Concerns over ransomware are growing and a new study finds that nearly half of all cloud-based malware now delivers ransomware applications.

2016-09-20

UK To Examine Phone Surveillance In Prisons

Its surprising that surveillance and tracking of mobile phone users in UK prisons has not been adopted earlier.

2016-09-19

Oliver Stone’s Snowden Film

Off The Grid: Making the film 'Snowden' had a chilling effect on the Directors own use of social media and the Internet.

2016-09-19

US Is Not Drawing 'Red Lines' in Cyberspace

The US government is avoiding drawing "red lines" in cyberspace to maintain strategic ambiguity about its intentions.

2016-09-19

Uber Starts Self Driving Taxis

Uber users will get a surprise the next time they request a pickup: the option to ride in a self-driving car.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

SABSACourses

SABSACourses

SABSA is a development process used for solving complex problems such as IT Operations, Risk Management, Compliance & Audit functions.

Lumeta

Lumeta

Lumeta’s cyber situational awareness platform is the unmatched source for enterprise network infrastructure analytics and security monitoring for breach detection.

BruCERT

BruCERT

BruCERT is the referral agency for dealing with computer-related and internet-related security incidents in Brunei Darussalam.

Muninn

Muninn

At Muninn (aka Wehowsky), we specialize in mitigating potential risks within your network, providing one of the leading network detection and response (NDR) solutions on the market.

Zeneth Technology Partners

Zeneth Technology Partners

Zeneth is a consulting firm providing information technology and cybersecurity services to federal and commercial clients.

XignSYS

XignSYS

XignSys develops innovative password-free and user-friendly Authentication solutions and electronic signature systems for B2B and B2C applications.

Defence Intelligence

Defence Intelligence

Defence Intelligence is an information security firm specializing in advanced malware protection.

Sequretek

Sequretek

Sequretek was formed with the aim to “Simplify Security”. We envision a future where enterprise networks are streamlined, secure and simple.

Defensity

Defensity

Defensity offer bespoke & pre packaged IT Security Solutions for Small business to help companies reduce overall IT related risk.

BreachLock

BreachLock

Breachlock delivers the most comprehensive Penetration Testing as a Service (PtaaS) powered by Certified Hackers and AI.

Anxinsec

Anxinsec

Anxinsec Technology is a security solution and service provider with a focus on new technology and innovations in cybersecurity.

RealTyme

RealTyme

RealTyme is a secure communication and collaboration platform with privacy and human experience at its core.

White Tuque

White Tuque

A new way to protect your organization. White Tuque is your partner in identifying threats, understanding your risk, and ensuring your business remains resilient.

Castlepoint Systems

Castlepoint Systems

Castlepoint Systems is a pioneer in information governance, risk and compliance as a service. An all-in-one solution offering powerful risk management, built in compliance, cybersecurity and audit.

Mindsprint

Mindsprint

Mindsprint (formerly Olam Technology and Business Services - OTBS) are a leading edge technology and business services firm.

Google Safety Engineering Center (GSEC)

Google Safety Engineering Center (GSEC)

GSEC Málaga is an international cybersecurity hub where Google experts work to understand the cyber threat landscape and to create tools that keep users around the world safer online.