News

2015-04-02

Battle for African Internet Users Stirs Fears

Google and Facebook are at the forefront of a scramble to win over new African Internet users.

2015-04-02

Building a Cyber Security Team from Within

Building an in-house cyber security operations center may be resource-intensive but it can safeguard your data.

2015-04-02

China Admits to Having Cyber Warfare Units

China has finally admitted that it has cyber warfare units and plenty of hackers attached with them.

2015-04-01

Israel Girds Itself for Cyber Warfare

Israel is preparing for escalating cyberwar.

2015-04-01

Iran has Built a Cyber Army Faster than Imagined.

Iran has increased its cybersecurity spending 12-fold.

2015-04-01

Will New US Cybersecurity Laws Actually Improve Security?

The US Congress just passed a Cybersecurity Bill that may actually damage cybersecurity.

2015-04-01

MI6 is in a Technology Race with Terrorists and Criminals

Britain’s intelligence agencies are engaged in a “technology arms race” with terrorists & cybercriminals the head of MI6 has warned.

2015-03-30

Talk of Cyber Attack as Huge Power Outages Hit Turkey

Dozens of Turkish cities were hit by a massive power outage on Tuesday - could Iran be responsible?

2015-03-28

IT Governance Cyber Security Phishing Awareness Course

IT Governance has launched a Cyber security and phishing staff awareness e-learning course to help businesses.

2015-03-30

Threat Lessons from Sony and Anthem

The cyberattack on Sony Pictures and Health Insurer Anthem have left plenty of unanswered questions.

2015-03-30

A Simple Guide to GCHQ's Hacking Powers

New documents released by the UK government and privacy advocates give a glimpse of how GCHQ operates.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Maureen Data Systems (MDS)

Maureen Data Systems (MDS)

Our mission at Maureen Data Systems is to digitally transform business environments with the use of cloud infrastructure, security and privacy controls, data analytics, and managed services.

Retail & Hospitality Information Sharing & Analysis Center (RH-ISAC)

Retail & Hospitality Information Sharing & Analysis Center (RH-ISAC)

Retail & Hospitality ISAC operates as a central hub for sharing sector-specific cyber security information and intelligence.

Bit4id

Bit4id

Bit4id provides software and systems for security and identification based on PKI technology.

Armadillo Sec

Armadillo Sec

Armadillo provide penetration testing and vulnerability assessment services.

Galois

Galois

Galois specializes in the research and development of new technologies that solve the most difficult problems in computer science.

Guidewire

Guidewire

Guidewire Cyence™ Risk Analytics is a cloud-native economic cyber risk modeling solution built to help the insurance industry quantify cyber risk exposures.

EOL IT Services

EOL IT Services

EOL IT Services is the UK’s most accredited provider of IT Asset Disposal (ITAD), Lifecycle Services and Data Destruction.

Blue Hexagon

Blue Hexagon

Blue Hexagon is a deep learning innovator focused on protecting organizations from cyberthreats.

Global Cyber Risk (GCR)

Global Cyber Risk (GCR)

Global Cyber Risk is a technology and advisory services firm that provides first tier cybersecurity services to both large corporations and small and mid-sized businesses.

Nassec

Nassec

Nassec is a Cyber Security firm dedicated to providing the best vulnerability management solutions. We offer tailor-made cyber security solutions based upon your requirements and nature of business.

NWN Corp

NWN Corp

NWN Corporation is a leading Cloud Communications Service Provider (CCSP) focused on transforming the customer and workspace experience for commercial, enterprise and public sector organizations.

AnaVation

AnaVation

AnaVation is a trusted partner delivering high-value, cost-effective solutions that solve the most complex technical and analytical problems for our customers.

GLIMPS

GLIMPS

GLIMPS-Malware automatically detects malware affecting standard computer systems, manufacturing systems, IOT or automotive domains.

CentriVault

CentriVault

CentriVault is a leading independent provider of Cyber Security and Data protection services to small and medium enterprises (SMEs).

Blattner Technologies

Blattner Technologies

Blattner Technologies mission is to be the leading provider of predictive transformation services and tools in the Data Analytics, Artificial Intelligence and Machine Learning industry.

Hughes Network Systems

Hughes Network Systems

Hughes are industry leaders in networking technologies and services, innovating constantly to deliver the global solutions that power a connected future for people, enterprises and things everywhere.