News

2015-03-30

Talk of Cyber Attack as Huge Power Outages Hit Turkey

Dozens of Turkish cities were hit by a massive power outage on Tuesday - could Iran be responsible?

2015-03-28

IT Governance Cyber Security Phishing Awareness Course

IT Governance has launched a Cyber security and phishing staff awareness e-learning course to help businesses.

2015-03-30

Threat Lessons from Sony and Anthem

The cyberattack on Sony Pictures and Health Insurer Anthem have left plenty of unanswered questions.

2015-03-30

A Simple Guide to GCHQ's Hacking Powers

New documents released by the UK government and privacy advocates give a glimpse of how GCHQ operates.

2015-03-31

Anonymous vs ISIS: the ongoing skirmishes of #OpISIS

Anonymous has been doing what it does best: hunting people. And now they are after ISIS.

2015-03-30

Facebook Data Row Reaches Top Euro Court

Max Schrems has long campaigned against Facebook's data practices. Now he has a day in Court.

2015-03-30

Bitcoin 'exit scam': Deep-Webbers disappear with $12m

The administrators of a top deep-web marketplace have disappeared

2015-03-29

Crime has gone High-Tech and the Law Hasn’t

Everthing is connected, everyone is vulnerable, and what we can do about it....

2015-03-30

China Reveals Its Cyberwar Secrets

A high-level Chinese military organization has acknowledged that its intelligence community have specialized units for waging cyber-war.

2015-03-26

You Can Tell Which Emails are Being Tracked.

You may not have heard of companies like Yesware, Bananatag, and Streak, however they almost certainly know a good deal about you.

2015-03-26

Drones: The Looming Threat

Unmanned aircraft, otherwise known as drones, are becoming common.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

Institute for National Security and Counterterrorism (INSCT)

Institute for National Security and Counterterrorism (INSCT)

INSCT is a center for the study of national security, international security, and counterterrorism. Research programs include New Frontiers in Science, Cyber, & Technology

WatchGuard

WatchGuard

WatchGuard is a leader in network security, secure Wi-Fi, and network intelligence products and services for SMBs and Enterprises worldwide.

MD5

MD5

MD5 is a leading UK provider of Digital Forensic & eDiscovery services to large multi-national corporate businesses, Law Enforcement & Government Agencies, high profile legal firms.

BlackBerry Security Services

BlackBerry Security Services

Blackberry provides intelligent security software and services to enterprises and governments around the world.

Dragos

Dragos

Dragos has built the first industrial cybersecurity ecosystem, the ultimate security defense.

herdProtect

herdProtect

herdProtect is a second line of defense malware scanning platform powered by 68 anti-malware engines in the cloud.

Advanced Systems International SAC

Advanced Systems International SAC

Advanced Systems international is a global company dedicated to data security software design, development, support, and licensing.

CSIRT GOV - Poland

CSIRT GOV - Poland

Computer Security Incident Response Team CSIRT GOV, run by the Head of the Internal Security Agency, acts as the national CSIRT responsible for coordinating the response to computer incidents.

Axio Global

Axio Global

Axio is a leading cyber risk management SaaS company. Our Axio360 platform gives companies visibility to their cyber risk, and enables them to prioritize investments to protect their business.

Guidehouse

Guidehouse

Guidehouse is a leading global provider of consulting services to the public and commercial markets with broad capabilities in management, technology, and risk consulting.

TRU Staffing Partners

TRU Staffing Partners

TRU Staffing Partners is an award-winning contract staffing and executive search firm for cybersecurity, eDiscovery and privacy companies and professionals.

Intellias

Intellias

Intellias is a trusted technology partner to top-tier organizations and digital natives helping them accelerate their pace of sustainable digitalization.

InfusionPoints

InfusionPoints

InfusionPoints is your independent trusted partner dedicated to assisting you in building your secure and compliant business solutions.

Fenix24

Fenix24

Fenix24 is an industry leader in the incident-response space. We ensure the fastest response, leading to the full restoration of critical infrastructure, data, and systems.

Cyberplc

Cyberplc

Cyberplc is a global cybersecurity consulting firm providing services to government, the public sector and enterprises.

Certera

Certera

Certera is a modern and affordable SSL Certificate, Code Signing Certificate, and Cyber Security Services provider.