News

2015-08-08

Could Cyberwar Knock Us Back to the Stone Age?

If there were a major cyberwar, just how bad would it be? Could modern civilization survive? A thought experiment by David Gewirtz.

2015-08-07

Internet of Things Unlocks Revenue Opportunities

Business is just beginning to see the potential of IoT & Big Data to create value.

2015-08-07

Spyware Demo Shows how Spies Hack Mobiles

Stolen Hacking Team mobile hacking software was recently published on the web. It works.

2015-08-06

Cyber Wars Are Good For Tech Businesses

Trending Higher as Investors Pile In on Cyber Security. Two Companies To Watch Out For? Cyber Ark & Palo Alto.

2015-08-06

MH370 may have been deliberately taken off course

US intelligence report suggests the missing Malaysia Airlines Flight MH370 may have been deliberately flown off course.

2015-08-05

How Analytics Will Influence Connected Cars

Connected services like in-car Wi-Fi are driving the adoption of cloud-based vehicle platforms enabled by embedded 4G broadband.

2015-08-04

Data Breaches Boost Funding for Cybersecurity Startups

In the first half of 2015 venture firms invested $1.2 billion in cybersecurity startups.

2015-08-04

SurfWatch Labs Rolls Out Dark Web Intelligence Service

SurfWatch collects sensitive cyber intelligence from the underground on threats relevant to a specific customer.

2015-08-04

Machine 2 Machine: Where will that leave us?

When machines communicate directly with each other without a human intermediary – will they prefer their own company?

2015-08-04

ISIS's Threat: A Cyber War Against America

ISIS has over 20,000 English-language Twitter followers "that...makes it harder to determine who's going to succumb to the propaganda."

2015-08-04

3D Xpoint Memory: Faster-than-flash Storage

3D Xpoint is a type of "persistent memory" - meaning it retains data stored on it when the power is switched off, unlike RAM.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Shavlik Protect

Shavlik Protect

Shavlik Protect is an easy-to-use security software solution that discovers missing patches and deploys them to the entire organization.

FireEye

FireEye

FireEye delivers unmatched detection, protection and response technology through an extensible and flexible cloud-based XDR platform.

Lantronix

Lantronix

Lantronix is a global provider of secure data access and management solutions for Internet of Things (IoT) and information technology assets.

Digital Detective

Digital Detective

Digital Detective offer a range of products and services for digital forensic analysis and advanced data recovery.

BTWorks

BTWorks

BTWorks provides identity management and anti-phishing / smishing solutions for web and mobile apps.

ActiveCyber

ActiveCyber

ActiveCyber is a source for news, reviews, learning, and technological innovation in the active cyber defense industry.

OEDIV SecuSys

OEDIV SecuSys

OEDIV SecuSys (formerly iSM Secu-Sys) develops high-quality IT software solutions, setting standards as a technology leader in the area of identity and access management.

SGBox

SGBox

SGBox is a highly flexible and scalable solution for IT security. Choose the modules which your company needs and implement it without any modification to your network infrastructure.

Morphus Information Security

Morphus Information Security

Morphus is an information security company providing Red Team, Blue Team and GRC services as well as conducting research in cybersecurity and threat analysis.

6point6

6point6

6point6 is a technology consultancy with strong expertise in digital transformation, emerging technology and cyber security.

Fudo Security

Fudo Security

Fudo Security is a leading provider of privileged access management and privileged session monitoring solutions.

443ID

443ID

443ID brings OSINT data to Identity Security professionals on any digital platform.

Atlas VPN

Atlas VPN

Atlas VPN is a highly secure freemium VPN service with a goal to make safe and open internet accessible for everyone.

CyberSanctus

CyberSanctus

CyberSanctus provide clients with a variety of pentest plans from the entry level starter plan, which is tailored for personal websites, to enterprise level pentests, tailored for large scale business

Sec3

Sec3

Sec3 is a security and research firm providing bespoke audits and cutting edge tools to Web3 projects.

Spectrotel

Spectrotel

Spectrotel, a trusted provider of Managed Network Solutions, elevates your network with solutions built on cutting-edge technologies.