News

2017-01-24

Cyber Attack Concerns Ahead Of French Elections

'No political party can say that their systems are seriously secured': France fears foreign interference in the imminent Presidential elections.

2017-01-23

Electoral Influence: 40yrs Of Kremlin Interference

Russian attempts to influence the US presidential election outcome should cause no surprise. It is traditional. Opinion By Prof. Christopher Andrew.

2017-01-20

Why Hasn't MH370 Been Found?

Lost: Three years after the Malaysian Boeing-777 changed course and disappeared. There are several theories about what happened, but few facts.

2017-01-20

Russia, Trump & Flawed Intelligence

US intelligence agencies have released a declassified version of a report on the part they believe Russia played in the US presidential election.

2017-01-19

Obama’s Cyber Legacy

Cyberspace was President Obama’s most unpredictable adversary, taking new directions & delivering blows where least expected.

2017-01-19

One Million Say Pardon Snowden & Russia Says He Can Stay Two More Years

Obama's Final Acts: No pardon for Edward Snowden who can safely remain in Russia, while Chelsea Manning is released from jail early.

2017-01-20

Yahoo’s Big Breach Is A Catalyst for Change

Yahoo’s latest security breach where hackers stole personal details from a billion users has the potential to become the biggest attack in history.

2017-01-18

Cyber Criminals Target African Banks

African nations' efforts to tackle cybercrime are gaining momentum as cyber criminals target them with ransomware.

2017-01-17

Canadian Police Investigating Hydro Cyberattack

A cyber-attack on an archaic, unused IP address at Hydro One could be part of a broader hacking campaign, security experts say.

2017-01-23

Robots Will Take Our Jobs – But That's Good.

The next time you're standing at a busy junction, look around and count how many people you can see driving for a living.

2017-01-23

Are You Ready For State-Sponsored Cyber Attack?

Geopolitical tensions ensure that 2017 will be another big year for large scale and potentially lethal state-sponsored cyber attacks.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Stratogent

Stratogent

Stratogent does IT and Cybersecurity operations. We specialize in high-touch and high-change IT environments, especially in the biotech and pharma industry verticals.

Copper Horse Solutions

Copper Horse Solutions

Copper Horse specialises in mobile and IoT security, engineering solutions throughout the product lifecycle from requirements to product security investigations.

Australian Cyber Security Growth Network (AustCyber)

Australian Cyber Security Growth Network (AustCyber)

AustCyber brings together businesses and researchers to develop the next generation of cyber security products and services.

Cipher Tooth

Cipher Tooth

CipherTooth is a superior system for delivering secure content over the Internet.

Private Internet Access

Private Internet Access

Private Internet Access is a Virtual Private Network services provider offering secure encrypted access to the internet.

Austrian Trust Circle

Austrian Trust Circle

Austrian Trust Circle is an initiative of CERT.at and the Austrian Federal Chancellery and consists of Security Information Exchanges in the areas of the strategic information infrastructure.

Practical Assurance

Practical Assurance

Practical Assurance helps companies navigate the rough terrain of information security compliance.

Variti

Variti

Variti Intelligent Active Bot Protection technology — traffic analysis, detection and stopping of malicious bots in real-time and effective response to DDoS attacks.

Bitbone

Bitbone

Bitbone develop IT infrastructure and IT security solutions that create long-term value.

Cynalytica

Cynalytica

Cynalytica deliver pioneering cybersecurity and machine analytics technologies that help protect critical infrastructure, securely enable Industry 4.0 and help accelerate digital transformation.

CloudWave

CloudWave

CloudWave, the expert in healthcare data security, provides cloud, cybersecurity, and managed services to healthcare organizations.

Lodestone

Lodestone

Lodestone partners with clients to help them mitigate business and reputational risk, through our human-based, approach to cyber security, digital forensics and incident response.

Port-IT

Port-IT

Port-IT is a leading partner in cybersecurity solutions tailored for the maritime industry.

Oxylabs

Oxylabs

Oxylabs is the largest datacenter proxy pool in the market, with over 2 million proxies. Designed for high-traffic, fast web data gathering while ensuring superior performance.

AI or Not

AI or Not

AI or Not - Leverage AI to combat misinformation and elevate the landscape of compliance solutions.

Maltiverse

Maltiverse

Maltiverse is a threat intelligence platform that provides security teams with high-fidelity threat data and malicious IOCs to enhance detection and response.