News

2018-08-30

GDPR Means Revisiting Email Marketing

Business can no longer approach email marketing strategies casually. Under GDPR, you are required to be able to prove every user chose to sign up.

2018-08-30

Satellite Imagery + Social Media = A New Way To Spot Emerging Nuclear Threats

Hiding illicit nuclear programs might be getting harder, thanks to new ways of gleaning and combining clues from different rivers of digital data.

2018-08-07

Criminals Are Driving Australian Data Breaches

Criminal attacks accounted for the majority of data breaches reported to the Office of the Australian Information Commissioner in Q2 2018.

2018-08-29

Estonia’s Cyber Revenge

Estonia, the small EU nation that was the first target of state-sponsored cyber warfare from Russia, may soon be able to strike back.

2018-08-29

Bank Industry Is Turning On To AI Technology

The rapid growth of AI is due to increasing market competition, the need to reduce overheads plus the benefits of capturing large volumes of data.

2018-08-29

What Is Stuxnet And Who Created It?

Thanks to Stuxnet, we now live in a world where covertly inserted malicious code can destroy machinery and stop (or start) a war.

2018-08-29

How Silicon Valley Became A Den Of Spies

Foreign spies have been showing up in Silicon Valley for a very long time and that has never been more true than today.

2018-08-28

One Answer To Cyber Attacks Is To Hack Back

Experts think the US government, along with private companies should go on the offensive by using the hackers’ own methods against them.

2018-08-28

The US Is Losing the Information War To Russia

NATO see no evidence that Russia's disinformation efforts have slackened, nor that the US is equipped to develop an effective response.

2018-08-30

World’s Top 20 Cybersecurity Companies

The experts at Pagan Research have ranked the top 20 in the Cybersecurity 500 leading cybersecurity companies.

2018-08-28

Nobody Is Talking About The  Age of Cyberwar

There is little debate about using cyber weapons, perhaps because these weapons remain invisible, the attacks deniable and the results uncertain.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

SANS Institute

SANS Institute

SANS is the most trusted and by far the largest source for information security training and security certification in the world.

Mako Group

Mako Group

The Mako Group specializes in protection - providing security through auditing, testing, and assessments. And, we do it all with the highest quality standards possible.

Cloudera

Cloudera

Cloudera provide the world’s fastest, easiest, and most secure data platform built on Hadoop.

CROW - University of Waikato

CROW - University of Waikato

CROW is the first cyber security lab established in a New Zealand educational institution at the University of Waikato.

Seclab

Seclab

Seclab is an innovative player in the protection of industrial systems and critical infrastructure against sophisticated cyber attacks.

Athena Dynamics

Athena Dynamics

Athena Dynamics focuses on Cyber Security, especially in Critical Information Infra-structure Protection and Enterprise IT Operation Management products and Services.

Cybersecurity Innovation Hub

Cybersecurity Innovation Hub

The main objective of the Hub is to bring cybersecurity and other advanced technologies closer to companies and as a result help to increase their performance as Industry 4.0.

Securis

Securis

Securis provides organizations and agencies with the highest level of professional, ultra-secure data destruction and IT recycling.

Labs/02

Labs/02

Labs/02 is a seed-stage incubator with a mission to advance cutting-edge technology in innovative areas including AI, deep learning, autonomous transportation, and smart cities.

EBRAND Services

EBRAND Services

EBRAND, the European experts for brand protection on the Internet. We offer a full set of services including cybermonitoring, fighting counterfeiting offences and online security.

Splone

Splone

Splone is a Berlin-based IT security research team and consultancy. We help improve IT-security by offering red team assements, penetration tests, audits and customized consulting.

IntelligInts

IntelligInts

IntelligInts provide 24×7 threat monitoring, hunting, alerting, and mitigation in our world class Security Operations Center.

Labaton Sucharow

Labaton Sucharow

Standing on the horizon of law and technology, our Cybersecurity and Data Privacy Practice helps to protect consumers who have been harmed by businesses’ failures to safeguard their customers' data.

Early Game Ventures (EGV)

Early Game Ventures (EGV)

Early Game Ventures invests in startups that jumpstart new industries in the emerging markets of Europe.

SENTRIQS

SENTRIQS

SENTRIQS advanced encryption technology is engineered to defend against the most sophisticated cyber threats, keeping your operations efficient and secure.

Network Coverage

Network Coverage

Network Coverage align, maintain, and integrate technology and cloud solutions with business operations to improve productivity and security with as few issues and disruptions as possible.