News

2017-01-20

Why Hasn't MH370 Been Found?

Lost: Three years after the Malaysian Boeing-777 changed course and disappeared. There are several theories about what happened, but few facts.

2017-01-20

Russia, Trump & Flawed Intelligence

US intelligence agencies have released a declassified version of a report on the part they believe Russia played in the US presidential election.

2017-01-19

Obama’s Cyber Legacy

Cyberspace was President Obama’s most unpredictable adversary, taking new directions & delivering blows where least expected.

2017-01-19

One Million Say Pardon Snowden & Russia Says He Can Stay Two More Years

Obama's Final Acts: No pardon for Edward Snowden who can safely remain in Russia, while Chelsea Manning is released from jail early.

2017-01-20

Yahoo’s Big Breach Is A Catalyst for Change

Yahoo’s latest security breach where hackers stole personal details from a billion users has the potential to become the biggest attack in history.

2017-01-18

Cyber Criminals Target African Banks

African nations' efforts to tackle cybercrime are gaining momentum as cyber criminals target them with ransomware.

2017-01-17

Canadian Police Investigating Hydro Cyberattack

A cyber-attack on an archaic, unused IP address at Hydro One could be part of a broader hacking campaign, security experts say.

2017-01-23

Robots Will Take Our Jobs – But That's Good.

The next time you're standing at a busy junction, look around and count how many people you can see driving for a living.

2017-01-23

Are You Ready For State-Sponsored Cyber Attack?

Geopolitical tensions ensure that 2017 will be another big year for large scale and potentially lethal state-sponsored cyber attacks.

2017-01-17

Internet Has Changed The Media Business Model

Advertising media is a broken business model.

2017-01-24

2017: Cybersecurity At A Turning Point

Cybersecurity threats are becoming more intelligent, autonomous and difficult to detect, creating an urgent need for accountability.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security is a leading manufacturer of network security appliances for use in industrial environments.

CSIRT Malta

CSIRT Malta

CSIRT Malta supports critical infrastructure organisations in Malta on how to protect their information infrastructure assets and systems from cyber threats and incidents.

GreyCampus

GreyCampus

GreyCampus is a leading provider of training for working professionals in the areas of Project Management, Big Data, Data Science, Service Management, Quality Management and Information Security.

Fortanix

Fortanix

Fortanix Runtime Encryption keeps keys, data, and applications completely protected from external and internal threats.

ES2

ES2

ES2 is a consulting organisation specialising in Enterprise Security and Solutions Services.

ScienceSoft

ScienceSoft

ScienceSoft is a provider of software development and IT consulting services including Information Security.

ISTC Foundation

ISTC Foundation

ISTC Foundation is one of the leading innovation centers in Armenia, founded by joint initiative of IBM, USAID, Armenian Government and Enterprise Incubator Foundation.

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection (HIP) is the premier educational forum for identity-centric cybersecurity practitioners charged with defending hybrid cloud environments.

TekSynap

TekSynap

TekSynap is a full spectrum Information Technology services provider to federal government agencies.

Drawbridge

Drawbridge

Drawbridge is a premier provider of cybersecurity software and solutions to the alternative investment industry.

Netgo

Netgo

Netgo group meet the requirements of a complex, digitized world with IT consulting, IT solutions & services, managed & cloud services and software products & development.

TheHive Project

TheHive Project

TheHive Project is a Scalable, Open Source and Free Security Incident Response Platform for SOC, CSIRT and CERT teams.

SkillsDA

SkillsDA

SkillsDA is pureplay company in cyber security involved in capacity building towards National Security.

OutKept

OutKept

OutKept offers the highest quality phishing simulation campaigns, supported by a community of ethical phishers, to build awareness, and maintain alertness.

Blackmere Consulting

Blackmere Consulting

Blackmere Consulting is a Nationwide Technical and Executive Recruiting firm dedicated to Cyber Security and Information Technology.

Lenze

Lenze

Lenze are an experienced partner for automation systems, digitalization and cyber security.