News

2016-10-31

Data Strategies Are Not Keeping Up With Cloud Migration

Enterprise data protection strategies might not be fully aligned with IT modernization initiatives driven by cloud computing.

2016-11-07

So Far In 2016 Data Breaches Are Up 20%

The US Identity Theft Resource Center (ITRC) reports 783 data breaches recorded and more than 29 million records exposed so far this year.

2016-11-04

Russian General Brags About Cyberwar Successes

Russian General Valery Gerasimov advocates covert & propaganda tactics to cause a perfectly thriving state to “sink into a web of chaos".

2016-10-31

The Internet Shutdown In Ethiopia

There is a government Internet shutdown in Ethiopia which will drain millions of dollars from the economy.

2016-10-26

UK’s Financial Centre Suffering Massive Ransomware Attacks

Financial services professionals working in London's international business centre are at the highest risk of receiving ransomware.

2016-10-26

British Military Is Using Cyber Warfare Against Islamic State

The UK admits using cyber warfare techniques in the fight against Islamic State for control of the Iraqi city of Mosul.

2016-10-26

US Intelligence Has The Evidence That Proves Russian Presidential Election Interference

Donald Trump says Hillary Clinton has 'no idea' if Russian hackers are interfering in the US Elections, but James Clapper does.

2016-10-26

US Banks Face New Demands To Protect Themselves From Hackers

The US Federal Reserve and other US regulators decide to force the biggest financial institutions to plug vulnerabilities against hackers.

2016-10-27

Valuable Security Assets Are Human, Not Technical

The biggest threat to healthcare IT security is the human element. But if human beings are the problem that also makes them the largest asset.

2016-10-25

Russian Citizen Charged With Hacking LinkedIn

A Russian man has been charged with stealing information from computers at LinkedIn and other San Francisco Bay Area companies.

2016-10-26

All Tesla’s Cars Will Have Full Self-Drive

Tesla has announced that all US Tesla cars made from now on will have all the hardware they need on board to achieve full self-driving.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Bundesdruckerei

Bundesdruckerei

Bundesdruckerei specializes in secure identity technologies and services for protecting sensitive data, communications and infrastructures.

Wibu-Systems

Wibu-Systems

Wibu-Systems is a leading provider of solutions for the Digital Rights Management (DRM) and anti-piracy industry.

CompliancePoint

CompliancePoint

We design and implement strategies, processes & procedures to mitigate risk, reach compliance goals, protect data assets, and meet industry standards.

Certego

Certego

Certego is a company of the VEM Sistemi Group specialised in providing managed computer security services and to combat Cyber Crime.

Ignyte Assurance Platform

Ignyte Assurance Platform

Ignyte Assurance Platform™ is a leader in collaborative security and integrated GRC solutions for global corporations in Healthcare, Defense, and Technology.

Gigacycle

Gigacycle

Gigacycle is one of the leading IT disposal and recycling providers in the UK. We specialise in IT asset disposal (ITAD) and data destruction.

TM One

TM One

TM One is the enterprise and public sector business solutions arm of Telekom Malaysia Berhad (TM) Group.

Global Cyber Risk (GCR)

Global Cyber Risk (GCR)

Global Cyber Risk is a technology and advisory services firm that provides first tier cybersecurity services to both large corporations and small and mid-sized businesses.

GateKeeper Enterprise

GateKeeper Enterprise

The GateKeeper Enterprise software is an identity access management solution. Automated proximity-based authentication into computers and websites. Passwordless login and auto-lock PCs.

Absa Cybersecurity Academy

Absa Cybersecurity Academy

Absa Cybersecurity Academy is an initiative aimed at empowering marginalised South African youths to become certified cybersecurity specialists.

IN4 Group

IN4 Group

IN4 Group is a skills, innovation and start-up services provider that specialises in supporting businesses with the training, communities, networks and advice they need to scale.

Silent Quadrant

Silent Quadrant

Silent Quadrant delivers incomparable cybersecurity consulting, digital transformation, and risk management within our purpose-driven clients - empowering them to be the most resilient entities.

Quantum eMotion (QeM)

Quantum eMotion (QeM)

Quantum eMotion is a Montreal-based advanced developer leading the way towards a new generation of quantum-safe encryption for the quantum computing age.

AArete

AArete

AArete is a global management and technology consulting firm specializing in strategic profitability improvement, digital transformation, and advisory services.

Lakera

Lakera

Lakera empowers developers and organizations to build GenAI applications without worrying about AI security risks.

Invictus International Consulting

Invictus International Consulting

Invictus International Consulting are a recognized leader in full-spectrum cyber technology solutions designed to protect the security of our nation's global defense and critical infrastructure.