News

2015-07-27

US vs Hackers: Still Losing

Computer networks of many U.S. federal agencies remain highly vulnerable to sophisticated cybercriminals.

2015-07-27

Internet of Things: A Mass Surveillance Infrastructure

‘The most powerful political tool ever created’

2015-07-27

Avoid Hiring a Cybercriminal: understand motivations & thoroughly vet employees

Employees are the biggest threat to business integrity. As FireEye has discovered.

2015-07-27

Automobile Industry Gears Up For Cyber-Threat

Threat Response: Automobile industry's intelligence sharing & analysis center (ISAC) is revving up to exchange cyber threat information.

2015-07-27

Hundreds of Thousands' of Vehicles At risk of Attack

Chrysler contemplate mass recall & software update to protect recent model Jeeps from remote control takeover.

2015-07-27

Dating Website Admits Hackers Have Stolen Data on Millions

Impact Team: Ashley Madison dating is website is thoroughly hacked for personal data for 37m people.

2015-07-24

Delivered: America’s Drone Debut

A Drone made from 3D printed parts will be first to have FAA approval for package deliveries.

2015-07-24

Hacking Team's Malware Uses a UEFI Rootkit

A Hacking Team tool that can modify a computer’s UEFI (Unified Extensible Firmware Interface) even after the hard drive is wiped.

2015-07-25

Finland – Prolific Hacker Arrested & Sentenced

Julius Kivimaki found guilty of 50.700 “instances of aggravated computer break-ins” affecting Harvard, MIT & a host of companies.

2015-07-24

Public-Private Partnerships in the Cyber Domain

Many ostensibly private sector technology firms are closely aligned with a particular nation state. Opinion by Jamie Collier

2015-07-24

United Hackers Given a Million Free Air Miles

Wearing a white hat: Hackers who spotted security holes in United Airline's website are well rewarded.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Assure Technical

Assure Technical

Assure Technical offers a holistic approach to Technical Security. Our expertise and services span across the Physical, Cyber and Counter Surveillance domains.

CyberArk Software

CyberArk Software

CyberArk is an established leader in privileged access management and offers the most complete set of Identity Security capabilities.

TZ-CERT

TZ-CERT

TZ-CERT is the National Computer Emergence Response Team of Tanzania.

Khipu Networks

Khipu Networks

Khipu Networks is an award winning Cyber Security Company delivering a wide range of network, wireless and security solutions, technologies and services across multiple sectors.

Secudos

Secudos

SECUDOS is an innovative appliance technology and services provider focused on IT security and compliance.

CyberSure

CyberSure

CyberSure is a programme of collaborations and exchanges between researchers aimed at developing a framework for creating and managing cyber insurance policy for cyber systems.

ABS Group

ABS Group

ABS Group provides risk and reliability solutions and technical services that help clients confirm the safety, integrity and security of critical assets and operations.

Concordium

Concordium

Concordium aims to build the world’s leading open-source, permissionless, and decentralized blockchain with built-in user identity at the protocol level.

CYSEC SA

CYSEC SA

Cysec is equipped to deliver agile security solutions for the most challenging IT infrastructures around the world.

Secured Communications

Secured Communications

Secured Communications has developed the only unified secure communications platform trusted by public safety and counter terrorism professionals around the world.

Center for Medical Device Cybersecurity (CMDC) - University of Minnesota

Center for Medical Device Cybersecurity (CMDC) - University of Minnesota

CMDC’s mission is to foster university-industry-government partnerships to assure that medical devices are safe and secure from cybersecurity threats.

Spike Reply

Spike Reply

Spike Reply is the company within the Reply Group focusing on cybersecurity and personal data protection.

Singularico

Singularico

Singularico help secure your software using the power of AI.

Alchemy Security Consulting

Alchemy Security Consulting

Alchemy Security Consulting specialise in offensive and defensive cyber security. We find the weak link in your security so you can patch it up fast and avoid being hacked.

SentryMark

SentryMark

Stay a Step Ahead of Emerging Threats. Deviate from the traditional siloed defenses and get the proactive and responsive cybersecurity solutions and services you deserve with SentryMark today.

SENTRIQS

SENTRIQS

SENTRIQS advanced encryption technology is engineered to defend against the most sophisticated cyber threats, keeping your operations efficient and secure.