News

2016-01-26

Another List Of Top Security Predictions For 2016

Extortapalooza: Here are some more best guesses about security threats 2016.

2016-01-26

‘I Hacked Citrix’ - Mystery Russian ‘w0rm’

Citrix, a US software company, specialising in virtualisation & cloud computing, has been compromised by a Russian hacker called w0rm.

2016-01-26

Bitcoin Developer Says Cryptocurrency Has Failed

A senior bitcoin developer has declared the cryptocurrency a failed experiment, blaming the refusal to adopt new standards.

2016-01-26

Is the US Ready For Cyberwar?

Not only is cyberwar between major world powers inevitable, but the US has allowed itself to fall dangerously behind in preparing for it.

2016-02-01

Islamic State Is An Existential Threat

Put together money, expertise & Islamist-nihilist philosophy and you have a weapon of huge destructive power. Opinion by John Lloyd

2016-01-28

How Much Are You Worth?

This new online tool can tell you what you should be earning from automated analysis of your CV.

2016-01-27

The New Art of War – Cyber Conflict

Cyberwar isn't going to be about hacking power stations. It's going to be far more subtle and much more dangerous.

2016-01-27

Safety Agreement On Cyber and Wired Vehicles

The US Govt. and 17 car makers have reached agreement to enhance vehicle safety to thwart cyber-attacks on their increasingly wired vehicles.

2016-01-27

Organisations Have A False Sense of Data Security (£)

Most organisations equate IT security compliance with actual strong defense, leaving their data at risk through a false sense of security.

2016-01-31

ISIS Hackers Join Forces with AnonGhost

Hackers supportive of the Islamic State militant group (ISIS) have teamed up with the Pro-Palestinian hacking group AnonGhost.

2016-01-27

When ISIS Turns to Cyber Warfare

A US cybersecurity software firm PKWare has made predictions for potential computer attacks in the US and the forecast is scary.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Information Risk Management (IRM)

Information Risk Management (IRM)

IRM is an international consultancy dedicated to helping organisations solve key business issues. We provide strategic cyber security advice across a wide range of sectors.

Eustema

Eustema

Eustema designs and manages ICT solutions for medium and large organizations.

Latvian Information & Communications Technology Association (LIKTA)

Latvian Information & Communications Technology Association (LIKTA)

LIKTA brings together leading Latvian companies, organizations and professionals in the field of Information & Communications Technology

Crossmatch

Crossmatch

Crossmatch is a world leader in risk-based composite authentication and biometric identity management.

Picus Security

Picus Security

Huge gaps often exists between the "perceived"​ and "actual"​ IT security level of an organization. Picus Security continuously assesses security controls and reveals deficient ones before hackers do.

The Data Privacy Group

The Data Privacy Group

The Data Privacy Group provide expert professional services underpinned by world leading automation tools and a consulting team specialized in privacy and data protection.

Synack

Synack

Synack provides a hacker-powered intelligence platform that uncovers security vulnerabilities that often remain undetected by traditional pen testers and scanners.

Nouveau

Nouveau

Nouveau Solutions is a specialist IT managed services company with a strategic focus on delivering cloud, infrastructure, compliance, network and security solutions.

CounterCraft

CounterCraft

The CounterCraft Cyber Deception Platform fits seamlessly into existing security strategies and delivers high-end deception for threat hunting and threat detection.

Sonda

Sonda

SONDA is the leading systems integrator and IT service provider in Latin America.

Center for Applied Cybersecurity Research (CACR) - University of Indiana

Center for Applied Cybersecurity Research (CACR) - University of Indiana

CACR serves Indiana and the nation by tackling cyber risk in research and other unusual environments through agile, holistic, principle-based cybersecurity.

CorkBIC International Security Accelerator

CorkBIC International Security Accelerator

CorkBIC International Security Accelerator invests in early stage disruptive companies in the security industry including, Cybersecurity, Internet of Things (IOT), Blockchain and AI.

Mjenzi Cloud

Mjenzi Cloud

Mjenzi Cloud is a provider of cloud IaaS solutions including managed backup services, affordable & secure cloud virtual compute/storage/compute services, bare-metal services and cloud security.

Proximity

Proximity

Proximity is a leading professional services organisation providing consulting, legal and commercial advisory solutions with a focus on government and regulated industries.

Raman Power Technologies

Raman Power Technologies

Raman Power Technologies focus on bringing value and solving business challenges through the delivery of modern IT services and solutions including cybersecurity.

SecurityBridge

SecurityBridge

SecurityBridge provide a cybersecurity connection between our customers’ IT departments, the forward-facing business services, and their SAP applications.