News

2015-03-31

Anonymous vs ISIS: the ongoing skirmishes of #OpISIS

Anonymous has been doing what it does best: hunting people. And now they are after ISIS.

2015-03-30

Facebook Data Row Reaches Top Euro Court

Max Schrems has long campaigned against Facebook's data practices. Now he has a day in Court.

2015-03-30

Bitcoin 'exit scam': Deep-Webbers disappear with $12m

The administrators of a top deep-web marketplace have disappeared

2015-03-29

Crime has gone High-Tech and the Law Hasn’t

Everthing is connected, everyone is vulnerable, and what we can do about it....

2015-03-30

China Reveals Its Cyberwar Secrets

A high-level Chinese military organization has acknowledged that its intelligence community have specialized units for waging cyber-war.

2015-03-26

You Can Tell Which Emails are Being Tracked.

You may not have heard of companies like Yesware, Bananatag, and Streak, however they almost certainly know a good deal about you.

2015-03-26

Drones: The Looming Threat

Unmanned aircraft, otherwise known as drones, are becoming common.

2015-03-26

Connected Cars: Risks for Automated Vehicles.

Every day more devices are being connected to the Internet and connected cars are growing in number.

2015-03-26

5 Essential Truths of The Internet Of Things

The Internet of Things (IOT) really will bring about a total paradigm shift, enabling instant sharing of real-time information.

2015-03-26

Amazon Gaming Site Hacked

Amazon.com Inc.’s video game streaming site Twitch Interactive Inc. is requiring users to reset their passwords following a suspected hack.

2015-03-24

US Loses Contact with Drone Aircraft in Syria

An unarmed US Predator drone aircraft went down in Syria, but it's not clear whether it was shot down as claimed by the Syrian government.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Netteam

Netteam

Netteam designs, implements and services networking solutions for companies of all sizes.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Inspirria Cloudtech

Inspirria Cloudtech

Inspirria Cloudtech is a specialized Cloud Technologies Services provider and Cloud Aggregator focused on executing cloud models for clients.

Government Communications Security Bureau (GCSB)

Government Communications Security Bureau (GCSB)

GCSB contributes to New Zealand’s national security by providing information assurance and cyber security to the New Zealand Government and critical infrastructure organisations.

Almond

Almond

Almond is positioned as a key independent French player in audit and consulting in the fields of Cybersecurity, Cloud and Infrastructure.

Cyber Security Authority (CSA) - Ghana

Cyber Security Authority (CSA) - Ghana

The Cyber Security Authority has been established to regulate cybersecurity activities in Ghana.

LogicBoost Labs

LogicBoost Labs

LogicBoost Labs has the expertise, experience, funding and connections to make your startup succeed. We are always interested in new ways to change the world for the better.

SYN Ventures

SYN Ventures

SYN Ventures invests in disruptive, transformational solutions that reduce technology risk.

Acronis

Acronis

At Acronis, we protect the data, applications, systems and productivity of every organization – safeguarding them against cyberattacks, hardware failures, natural disasters and human errors.

Bleach Cyber

Bleach Cyber

Bleach Cyber helps small businesses with an affordable and user-friendly solution for managing cloud security.

DeviQA

DeviQA

DeviQA provide best-in-class quality assurance services to companies of all sizes.

Myrror Security

Myrror Security

Myrror Security is a software supply chain security solution that aids lean security teams in safeguarding their software against breaches.

DuckDuckGoose

DuckDuckGoose

DuckDuckGoose offer advanced solutions to protect against manipulated videos, images, voices and texts.

Treacle Technologies

Treacle Technologies

Treacle Technologies are a Cyber Security startup with a focus on Defensive Security.

Eclypses

Eclypses

Eclypses has a disrupting cyber technology, offering organizations an advanced data security solution called MicroToken Exchange (MTE).

Information Security Society of Africa – Nigeria (ISSAN)

Information Security Society of Africa – Nigeria (ISSAN)

The Information Security Society of Africa – Nigeria (ISSAN) is a not-for-profit organization dedicated to the protection of Nigeria’s cyberspace.

Black Alps

Black Alps

Black Alp's mission is to promote cybersecurity through the organization of dedicated events.