News

2017-06-21

Intel's Data Solutions For Military & Commercial Use

Intel has been selected by DARPA to develop a powerful new data analysis platform that will use machine learning and other AI techniques.

2017-06-23

Czechs Must Get Ready for Offensive Cyberwar

Czech security chief wants to create the necessary capacities to attack its enemy's cyber infrastructure in the case of an online attack.

2017-06-26

Getting Threat Intelligence Right

Threat intelligence is essential to alert security analysts to threats that are proliferating but have yet to infiltrate company networks.

2017-06-22

Cybersecurity Threats Are Changing Recruitment

Security awareness, data analysis and analytic skills: Cybersecurity threats and increased hacking are changing the job skills employers look for.

2017-06-20

WikiLeaks Releases More Info On CIA Malware

Codenamed Pandemic, this ingenious CIA tool targets computers with shared folders, from where users can download files via SMB.

2017-06-26

Canada Prioritizes Cyber-Attack

Canadian defence forces will be asked to do more to battle cyber threats and take a larger role in drone warfare.

2017-06-22

Impact Of AI On UK Jobs Divides Opinion

BT say that IT decision makers are divided about the impact of disruptive technologies including AI and automation on the UK labour market.

2017-06-20

WannaCry Prompts Microsoft Updates … And A Warning

Microsoft has released new security updates for older versions of Windows as it warns of potential cyber-attacks by government organisations.

2017-06-20

US Presidential Election Hacks Revealed

The NSA say that Russian hacking efforts around the US presidential election were much broader & more pervasive than originally known.

2017-06-19

US Blames North Korea For Hacking

Finally: The US government has issued a rare alert squarely blaming North Korean for a raft of cyber-attacks stretching back to 2009.

2017-06-19

Machine Learning Writes Better Emails

Hierarchical Models Of Language: Google is introducing an enhanced version of its “smart reply” machine-learning email software.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CloudLayar

CloudLayar

CloudLayar is a cloud-based website firewall for protecting your website against online threats.

NordForsk

NordForsk

NordForsk facilitates and provides funding for Nordic research cooperation and research infrastructure. Project areas include digitalisation and digital security.

Cyber Execs

Cyber Execs

Cyber Execs is a Cyber Security Consultancy & Executive Recruitment firm.

Cybersecurity Association of Maryland (CAMI)

Cybersecurity Association of Maryland (CAMI)

CAMI’s mission is to create a global cybersecurity marketplace in Maryland and generate thousands of high-pay jobs through the cybersecurity industry.

Calian Group

Calian Group

Calian is a diverse Canadian company offering professional services in areas including Advanced Technologies, Health, Learning and IT & Cyber Solutions.

Digital Innovation Hub Slovenia (DIH)

Digital Innovation Hub Slovenia (DIH)

DIH Slovenia is a central hub providing services to grow digital competencies in areas including robotics, IoT, cyberphysical systems and cybersecurity.

Seekurity

Seekurity

Seekurity is an information security consulting firm specialized in all areas of Cyber Security including Penetration Testing, Vulnerability Assessments and Risk Management.

Southwest Research Institute (SwRI)

Southwest Research Institute (SwRI)

Southwest Research Institute SwRI are R&D problem solvers providing independent services to government and industry clients. Areas of expertise include Cybersecurity, Intelligent Networks and IoT.

101 Blockchains

101 Blockchains

101 Blockchains is a professional and trusted provider of enterprise blockchain research and training.

Zero Networks

Zero Networks

With Zero Network, you can achieve affordable, airtight network access security at scale.

Veratad Technologies

Veratad Technologies

Veratad Technologies, LLC is a world class provider of online/real-time Identity Verification, Age Verification, Fraud Prevention and Compliance Solutions.

Larsen & Toubro Infotech (LTI)

Larsen & Toubro Infotech (LTI)

LTI is a global technology consulting and digital solutions company with operations in 33 countries.

Information Security Officers Group (ISOG)

Information Security Officers Group (ISOG)

ISOG's mission is to strengthen information security through awareness and education programs, promoting community and fellowship among information security leaders.

Quantum Ventura

Quantum Ventura

Quantum Ventura is a technology innovation company with a single mission of delivering customer-centric advanced solutions to US Federal & State Governments and Private Sector customers.

Aegis9

Aegis9

Aegis9 is an Australian owned and sovereign consultancy that specialises in providing tailored security solutions for both public and private sector clients based on their specific needs.

Strobes Security

Strobes Security

Strobes is among the world’s first cybersecurity platforms specifically designed for end-to-end continuous threat exposure management.