News

2017-01-10

Ransom Worm: The Next Level Of Cybersecurity

Holding your data hostage and seeking cash payment is bad enough. The next stage of ransomware is going to be even worse.

2017-01-10

Propaganda & Bias In Social Media News

The Fourth Industrial Revolution is beginning to pose some tough ethical questions. Can it be ensured that technology works for society?

2017-01-10

Shades of Watergate – The Fake Russian Hacking

Does the 1972 Watergate scandal cast light on current accusations of Russian hacking & threats to US critical infrastructure? Opinion by Annie Machon

2017-01-10

CIOs Defend Against Cybersecurity Threats Using Behavioral Analytics

Anomaly-detecting analytics can help anticipate and detect a variety of threats, including phishing scams and advanced persistent threats.

2017-01-09

Driverless Future Won't Start With Self-driving Cars

Look Out! You are more likely to see a driverless truck on the motorway before you see a self-driving car.

2017-01-09

Will It Be Possible To Hack Connected Nuclear Weapons?

Future nuclear warheads will be networked, with a greater potential for mishaps. Is that wise?

2017-01-09

CIOs Are Neglecting Process & Most Efficient Options

Improving business processes can lead to clear benefits in procuring operational efficiency and gaining a competitive business advantage.

2017-01-06

Trump Offers A Cyber Security Warning

No computer is safe: If you have something really important, write it out and have it delivered by courier.

2017-01-06

New Age of Digital Farming

Precision Agriculture can transform the food industry to be more efficient, less costly, and more sustainable.

2017-01-06

Ex-MI6 Chief Warns Over Electronic Voting

The stubby pencil and piece of paper that you put your cross on in the ballot box is actually much more secure than anything which is electronic

2017-01-06

Virtual Reality Is Getting Real In 2017

Is VR is going to become the next major computing platform, in the same way that mobile phones have superceded desktop PCs?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Arista Networks

Arista Networks

Arista Networks is an industry leader in data-driven, client to cloud networking for large data center, campus and routing environments.

BetterCloud

BetterCloud

BetterCloud puts IT in control of the modern workplace through user lifecycle management, data discovery, and IT and security automation purpose-built for SaaS.

Executive Women's Forum (EWF)

Executive Women's Forum (EWF)

The Executive Women's Forum is the largest member organization serving emerging leaders and influential female executives in the Information Security, Risk Management and Privacy industries.

NSIDE Attack Logic

NSIDE Attack Logic

NSIDE Attack Logic simulates real-world cyber attacks to detect vulnerabilities in corporate networks and systems.

Trust Stamp

Trust Stamp

Trust Stamp provide Identity and Trust as a Service to answer two fundamental questions: “Who are you?” and “Do I trust you?"

Broadcom

Broadcom

Broadcom is a global technology leader that designs, develops and supplies a broad range of semiconductor and infrastructure software solutions.

Risk Strategies

Risk Strategies

Risk Strategies is a leading specialty risk management consultancy and insurance broker offering smarter, practical approaches to risk mitigation including Cyber Liability insurance.

Belcan

Belcan

Belcan is a global supplier of engineering, manufacturing & supply chain, workforce and government IT solutions to customers in the aerospace, defense, automotive, industrial, and private sector.

Zaviant Consulting

Zaviant Consulting

Zaviant Consulting is a leading data security and privacy consulting firm assisting organizations comply with constantly evolving security frameworks and privacy regulations.

Trace3

Trace3

Trace3 is a pioneer in business transformation solutions, empowering organizations to keep pace with the rapid changes in IT innovations and maximize organizational health.

Oort

Oort

Oort is an identity threat detection and response platform for enterprise security. The Oort platform is API-driven, cloud-native and agentless for rapid time to value and high scalability.

Commission Nationale de l'Informatique et des Libertés (CNIL)

Commission Nationale de l'Informatique et des Libertés (CNIL)

The mission of CNIL is to protect personal data, support innovation, and preserve individual liberties.

Infisign

Infisign

Infisign addresses the challenges of traditional IAM systems and offers a comprehensive solution for modern identity management.

Afripol

Afripol

AFRIPOL was set up to strengthen cooperation between the police agencies of AU member states in the prevention and fight against organized transnational crime, terrorism, and cybercrime.

Invictus International Consulting

Invictus International Consulting

Invictus International Consulting are a recognized leader in full-spectrum cyber technology solutions designed to protect the security of our nation's global defense and critical infrastructure.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Dedagroup (Deda)

Dedagroup (Deda)

Dedagroup provide application solutions and IT services to bring innovation at the core of business processes.