News

2016-09-13

After A $65m Hack, Is Bitcoin Really Safe & Secure?

It seemed bitcoin exchange Bitfinex was doing all the right things. But, that didn’t stop hackers from stealing $65 million.

2016-09-13

Snowden: NSA Hacking Tools Leak Is ‘a warning’

From safety in Moscow and with a new film coming out, Edward Snowden opines on the NSA Equation Group hack.

2016-09-12

New Self-Driving Cars On The Market In 2019

MobileEye and Delphi are cooperating to offer vehicle manufacturers an end-to-end technology platform to make mass-market driverless cars.

2016-09-12

China Puts Quantum Encryption Into Orbit

A new satellite designed to establish ultra-secure quantum communications by transmitting uncrackable keys from space.

2016-09-12

Iraqi Military Invent A Unique Robot To Fight ISIS

Iraqi army is innovating as it deploys new weapons to drive out ISIS from occupied areas.

2016-09-12

Protecting Vehicles From Cyber- Attack

Cars and trucks with GPS, Bluetooth, and internet connections are clearly vulnerable to cyber attacks.

2016-09-12

Leak Spotlights NSA's Conflicting Missions

As well as spying overseas, the NSA has a lesser-known but growing role of helping to protect the US government's sensitive data.

2016-09-08

The Evolution of Hacking

The word “hacker” carries an overwhelmingly negative connotation, conjuring up images of digital thieves. It wasn’t always that way.

2016-09-08

UK Army Goes High-Tech With Future Drones

The British military is planning to invest over $1 billion in speculative technologies including insect-sized drones, laser firearms, & VR goggles.

2016-08-30

Zimababwe Cyber Law Threatens Freedom of Expression

Computer & Cyber Crime Bill would enable government to demand the source of information of any content it deems to be against the law.

2016-08-30

NSA Hackers Demand One Million Bitcoin

Shadowbrokers hold NSA to ransom and want to be paid in everyone’s favorite terror financing and money laundering currency - Bitcoin.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

mile2

mile2

Mile2 develop and deliver proprietary vendor neutral professional certifications for the cyber security industry.

MobileIron

MobileIron

MobileIron provides EMM capabilities to IT organizations that need to secure mobile devices, applications and content.

CDNetworks

CDNetworks

CDNetworks is a global content delivery network with a fully integrated cloud security solution, offering unparalleled speed, security and reliability for the almost instant delivery of web content.

IronScales

IronScales

IronScales combines human intelligence with machine learning to automatically prevent, detect and respond to email phishing attacks.

Redspin

Redspin

Redspin provide penetration testing, security assessments and consulting services.

Pareteum

Pareteum

Pareteum is a leading Global provider of mobile networking software and services. Our mission is to provide a single solution to the problem of fully enabling and securing the Mobile Cloud.

iQuila

iQuila

iQuila is a virtual overlay network which runs on top of an existing network. It creates a secure software enabled layer 2 connection across the internet or any public or private cloud.

CyberSaint Security

CyberSaint Security

CyberSaint’s CyberStrong Platform empowers organizations to implement automated, intelligent cybersecurity compliance and risk management.

Glilot Capital Partners

Glilot Capital Partners

Glilot Capital Partners is an Israeli seed and early-stage VC. We specialize in businesses which disrupt enterprise technology, mainly in the fields of AI, big data and cybersecurity.

Cyber Risk Institute (CRI)

Cyber Risk Institute (CRI)

CRI is a not-for-profit coalition of financial institutions and trade associations working to protect the global economy by enhancing cybersecurity and resiliency through standardization.

Ensighten

Ensighten

Ensighten is a leader in Website Security & Privacy Compliance. Protect your website from malicious attacks, monitor & detect vulnerabilities, protect consumer data.

SGTech

SGTech

SGTech is the leading trade association for Singapore's tech industry, offering focused support and development to both strategic and emerging sectors in the industry.

Forensic IT

Forensic IT

Forensic IT is a specialised cyber security firm with expertise in Digital Forensics and Incident Response (DFIR).

Siguria Kibernetike (Cyber Security)

Siguria Kibernetike (Cyber Security)

Siguria Kibernetike is a company based in Tirana that offers full service in the field of cyber and physical security.

QualySec

QualySec

QualySec is a leading cybersecurity firm specializing in comprehensive penetration testing and risk assessment services.

X-PHY

X-PHY

X-PHY is a pioneering cybersecurity company dedicated to hardware-based cybersecurity solutions that protect data at its core.