News

2016-12-01

Medical Devices Are The Weak Link

For many users of the OneTouch Ping insulin pump, the benefit of ease of use has been outweighed by the fear of hacking.

2016-11-30

UK National Cyber Security College Locates To Bletchley Park

The home of the Enigma codebreakers Bletchley Park is set to become the home of the UK’s first ever National College of Cyber Security.

2016-11-30

Facebook’s Secret Censorship Deal With China

Facebook has developed censorship software in an effort to get China to lift its seven-year ban on the world’s largest social network.

2016-11-30

From A Distance: Robot Remote Control

AI software and robotics-based hardware designed to achieve an exoskeleton that can mimic human movements from long distance.

2016-11-30

US Navy Personnel Data Breached

The US Navy is investigating a data breach after personal information of more than 130,000 sailors was accessed.

2016-11-30

Jihadi Cybercrime

Islamic State inspired websites & social media outlets don't just promote Jihad. They also teach cybercrime techniques.

2016-11-30

Malware Makes ATMs 'spit cash'

Malicious software used by the gang known as Buhtrap has been hacking Russian bank cash machines and is coming this way soon.

2016-11-29

Can Snowden Testify in Berlin?

Political Manoeuvers: Opposition parties seek legal protection for Edward Snowden to address German Parliamentarians.

2016-11-29

CIA Chief - Trump Picks Pompeo

CIA Director-designate Mike Pompeo has supported NSA surveillance programs and criticised Silicon Valley's stance on encryption.

2016-11-29

US Election Recounts In ‘Hacked’ States?

Hacking The Vote: Calls for a ballot recount in three critical swing states renew concerns over possible US electoral interference.

2016-11-28

Five Things AI Can Do Better Than Humans

Apart from boardgames, what else is Artificial Intelligence good for? Here are five tasks for AI in which it can equal, or surpass, humans.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Marsh

Marsh

Marsh is a global leader in insurance broking and risk management and has been a leader in combatting cyber threats since their emergence.

Vaulto Technologies

Vaulto Technologies

Vaulto protects critical business processes that are conducted via the cellular network.

Myra Security

Myra Security

The fully automated Myra DDoS Protection reliably protects web applications, websites, DNS servers, and IT infrastructures.

Austrian Trust Circle

Austrian Trust Circle

Austrian Trust Circle is an initiative of CERT.at and the Austrian Federal Chancellery and consists of Security Information Exchanges in the areas of the strategic information infrastructure.

MER Group

MER Group

MER Group is a world-leading integrator in the areas of communications and security. MER cyber solutions cover the entire range of cyber and intelligence related products and services.

GLESEC

GLESEC

GLESEC offer a complete range of Cyber Security services from Operations & Intelligence Services to Auditing & Compliance and Simulation and Training.

Chainlink

Chainlink

Chainlink expands the capability of smart contracts by enabling access to real-world data and systems without sacrificing the security and reliability guarantees inherent to blockchain technology.

Belcan

Belcan

Belcan is a global supplier of engineering, manufacturing & supply chain, workforce and government IT solutions to customers in the aerospace, defense, automotive, industrial, and private sector.

BaXian Group

BaXian Group

BaXian AG is an international consulting company specializing in IT security, data analytics, risk management and compliance.

Dimension Data

Dimension Data

Dimension Data is a leading African born technology provider operating in the Middle East and Africa, offering a portfolio of services including intelligent security solutions.

Tsaaro Academy

Tsaaro Academy

Tsaaro Academy is a unique privacy certification training platform and here you earn a privacy certification CEH, CISM and DPO from India’s No.1 Privacy training platform.

63 Moons Technologies (63MT)

63 Moons Technologies (63MT)

63 Moons Technologies is a world leader in providing next-generation technology ventures, innovations, platforms, and solutions.

Huntr

Huntr

Huntr provides a single place for security researchers to submit vulnerabilities, to ensure the security and stability of AI/ML applications.

BreakPoint Labs

BreakPoint Labs

BreakPoint Labs is dedicated to providing the methods and means for sustainable, measurable, and effective cybersecurity operations.

XONA

XONA

XONA is The Zero Trust user access platform for the OT enterprise. Secure operational access to critical systems - from anywhere.

Lenze

Lenze

Lenze are an experienced partner for automation systems, digitalization and cyber security.