News

2015-08-14

No. Petition to Pardon Snowden Rejected by Obama

The U.S.President and a majority of lawmakers maintain that Snowden must be prosecuted for violating the law.

2015-08-13

Artificial Intelligence Decodes ISIS

Artificial intelligence has been used to gain insights into the tactics of Islamic State.

2015-08-11

How To Avoid All-Out War in Cyberspace

The most cantankerous states in cyberspace tend to behave in a responsible manner because to act otherwise would invite terrible consequences.

2015-08-11

Inside the FBI Cyber Division

The biggest threats the FBI's new agents will face are not the ones they will confront on the streets, but the ones online.

2015-08-11

Will Robots Eliminate Many Humans From the Workplace?

The fear of millions of jobs being automated out of existence by robots is real. Here's how it will change the world -- for the better.

2015-08-10

The UK Government is Offering £5000 Cyber Secure Vouchers to SMEs

A campaign to improve understanding & cyber-strategy with a financial incentive scheme for SMEs adopting the right controls and solutions.

2015-08-10

Interpol is Training Police to Fight DarkNet Crime

Interopol run a five-day course on Tor hidden services, illegal marketplaces & crypto currencies to investigate crimes on the DarkNet.

2015-08-10

Medical Devices are Vulnerable to Hackers

Cars. Planes. Phones. Now vulnerabilities in the infusion devices that hospitals use to administer intravenous drugs are identified.

2015-08-10

Smart Homes and the Data Underclass

Internet of Things: Could insurance companies use our own IoT data against us?

2015-08-10

90% of Android Devices Are DoS Vulnerable

A second denial-of-service (DoS) vulnerability impacting the majority of Android devices in use.

2015-08-10

Cyber Extortion: A Growth Industry

The prevailing wisdom in law enforcement has been that it is a bad idea to negotiate with extortionists. Is it?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Gigamon

Gigamon

Gigamon provides intelligent Traffic Visability solutions that provide unmatched visbility into physical & birtual networks without affecting the performance or stability of production environments.

Lantronix

Lantronix

Lantronix is a global provider of secure data access and management solutions for Internet of Things (IoT) and information technology assets.

Cyber Technology Institute - De Montfort University

Cyber Technology Institute - De Montfort University

The Cyber Technology Institute provides training and high quality research and consultancy services in the fields of cyber security, software engineering and digital forensics.

Infrascale

Infrascale

Infrascale specialise in providing cloud backup and disaster recovery services.

STMicroelectronics

STMicroelectronics

ST is a global semiconductor leader delivering intelligent and energy-efficient products and solutions that power the electronics at the heart of everyday life.

maCERT

maCERT

maCERT is the national Computer Emergency Response Team for Morocco.

ClickDatos

ClickDatos

ClickDatos specializes in consulting, auditing, data protection training, accredited by ISO/IEC 27001 certification.

Ikarus Security Software

Ikarus Security Software

Ikarus focuses on antivirus and content-security solutions.

Oxford BioChronometrics

Oxford BioChronometrics

By building profiles based on electronically Defined Natural Attributes, or e-DNA, Oxford BioChronometrics protects digital networks, communities, individuals and other online assets from fraud.

Prolimax

Prolimax

Prolimax deliver innovative solutions to IT Manufacturers, Distributors, Resellers and End-users including Data Erasure and secure IT Asset Disposition (ITAD)

Cyber Security Africa

Cyber Security Africa

Cyber Security Africa is a full-service Information Security Consulting firm offering a comprehensive range of Services and Products to help organizations protect their valuable assets.

Founder Shield

Founder Shield

Founder Shield is a data driven insurance brokerage focused excusively on rapidly evolving high-growth companies.

Sylint

Sylint

Sylint is an internationally recognized cyber security and digital data forensics firm with extensive experience discretely addressing some of today’s biggest cyber breaches.

Cerby

Cerby

Your team uses unmanageable applications that put you, your company, and your data at risk. Protect, secure, and accelerate your business automatically with Cerby.

Transatlantic Cyber Security Business Network

Transatlantic Cyber Security Business Network

The Transatlantic Cyber Security Business Network is a coalition of UK and US cyber security companies which facilitates collaboration to help address critical cyber security challenges.

All About Cookies

All About Cookies

All About Cookies is an informational website that provides tips, advice, and recommendations to help you with Online Privacy, Identity Theft Prevention, Antivirus Protection, and Digital Security.