News

2016-11-25

US Army Command Learning Cyberwar From Social Media

Young, social media-using soldiers may be the linchpin in the US Army's efforts to use cyberwar networks & virtual effects against enemies.

2016-11-24

Some Observations On Britain's New Cyber Security Strategy

A new strategy document spells out an assertive posture by a UK government that seems wary of sharing intelligence capabilities between allies.

2016-11-28

New Business Protection From Cyber Attackers

Entrepreneurs can be so focused on business building & day-to-day operations that they forget to protect their most precious data.

2016-11-23

BlackNurse DDoS Attacks Are Small But Mighty.

BlackNurse is a revolutionary cyber-attack technology. Hackers only need a laptop and minimal data to perform a crippling DDoS attack.

2016-12-03

Four Amazing Cybersecurity Facts

The global cybersecurity market is growing in every way. In Value, in Risks, in Costs and in the level of internal & external Threat.

2016-11-21

Adult Friend Finder & Penthouse Hacked

Adult dating and pornography site company Friend Finder Networks has been hacked, exposing 412m private accounts.

2016-12-06

Why Science Couldn’t Predict a Trump Presidency

The unexpected result wasn’t a failure of science.

2016-11-21

Five major Russian Banks Attacked

At least five major banks in Russia have been hit with a series of cyberattacks made possible by a malicious botnet.

2016-12-07

Both Police & Business Must Deal With Cyber Extortion

Hospitals, government organizations and banks are all targets to ransomware, where critical data is held hostage. The challenge can be traumatic.

2016-12-05

Israel To Assist Nigeria With Cybersecurity

Israel has pledged to assist Nigeria in tackling cyber-crime and internal security through the use of modern technology.

2016-12-02

Cyber Security Market Is In A People-Power Crisis

The rising cybercrime threat has driven the demand for cybersecurity professionals through the roof.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DCL Search & Select

DCL Search & Select

DCL Search & Selection connect candidates to the best companies in the IT Security, Telco, UC, Outsourcing, ERP, Audit & Control markets.

Bromium

Bromium

Bromium deliver a new technology called micro-virtualization to address the enterprise security problem and provide protection for end users against advanced malware.

Perspective Risk

Perspective Risk

Perspective Risk provides penetration testing, security assessments, risk management & compliance solutions, InfoSec training and consultancy services.

ATIA

ATIA

ATIA provides consulting services in the design and implementation of IT system, Information Security, ISO certification, and professional IT training and education.

ThreadStone Cyber Security

ThreadStone Cyber Security

ThreadStone Cyber Security offer reliable, practical and affordable cyber security solutions for both large and smaller organizations that we develop and deliver ourselves from Europe.

CyberCareers.gov

CyberCareers.gov

CyberCareers.gov is a platform for Cybersecurity Job Seekers, Federal Hiring Managers and Supervisors, Current Federal Cybersecurity Employees, Students and Universities.

TechBeacon

TechBeacon

TechBeacon.com is a digital hub by and for software engineering, IT and security professionals sharing practical and passionate guidance to real-world challenges.

2Keys

2Keys

2Keys designs, deploys and operates Digital Identity Platforms and Cyber Security Platforms through Managed Service and Professional Service engagements.

Alpine Cyber Solutions

Alpine Cyber Solutions

Alpine Cyber is a Managed IT Service Provider focused on cybersecurity and cloud services.

Jacobs

Jacobs

Jacobs is at the forefront of the most important security issues today. We are inspired to be the best and deliver innovative, mission-focused outcomes that matter to our clients.

Sharktech

Sharktech

Sharktech designs, develops, and supports advanced DDoS protection and web technologies.

BugDazz

BugDazz

BugDazz pentest as a service (PTaaS) platform helps bringing in real-time results, detail coverage, & easy remediation workflows with compliance-ready reports.

CyberArmor

CyberArmor

Cyber Armor defend everyday IT and OT systems, from government agencies to critical infrastructure, from system integrators to small industries.

TatvaSoft

TatvaSoft

TatvaSoft is a custom software development company delivering business IT solutions and related services to customers across the globe.

Vultara

Vultara

Vultara provides web-based product security risk management tools for electronics manufacturers.

Fortress SRM

Fortress SRM

Fortress SRM protects companies from the financial, operational, and emotional trauma of cybercrime by improving the security performance of its people, processes, and technology.