News

2016-09-02

Internet of Things Will Turn Hacks Into Disasters

The next US President will probably be forced to deal with a large-scale internet disaster that kills multiple people.

2016-09-02

Russian Site is One-Stop Shop for Cyber-Crime

An “all-in-one” outsourced online shop for cyber-criminals looking for low-cost entry methods to sell their ill-gotten assets.

2016-09-02

CIA Sees Intel Data Flood As Both A Benefit And A Danger

Deputy CIA Director Sean Roche reflects on the changes in the nature of intelligence gathering & analysis since the end of the Cold War.

2016-09-01

Benefits of Penetration Testing

The means to identify potential vulnerabilities in your systems and prevent threats from being enacted before they can occur is vital

2016-09-01

Cybercrime Links To Russian State Hackers

The sheer volume and increasing sophistication of criminal cyber attacks provide plausible deniability to state-sponsored groups.

2016-09-01

Anatomy Of Cyber Jihad

Islamic State already has the motive, means, and opportunity to acquire the personnel & code necessary to launch devastating cyber attacks.

2016-09-01

Europol Warn Of The Ransomware Threat

Europol has joined forces with cyber security companies to launch a worldwide initiative to tackle Ransomware used by cyber criminals.

2016-08-31

Russian State Agencies Infected With Spyware

While US security experts suspect Russian interference with the presidential campaign, the Russian Government is under attack.

2016-08-31

Humans And The Robotic Future

Imagine a world where where nearly every online interaction takes place with a Siri, Alexa, Cortana or some soon-to-be-named artificial being.

2016-08-31

Edward Snowden Proposes Smartphone Privacy

Russia-based privacy advocate Edward Snowden has proposed a device that will inform users when their phones are disclosing their location.

2016-08-31

Psychological Warfare On Social Media

Twittersphere: Cyberwar between India and Kashmiri insurgents is hotting up with a big PsyOps element, focused on social media.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Exploit Database (EDB)

Exploit Database (EDB)

The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

Thycotic

Thycotic

Thycotic prevents cyber attacks by securing passwords, protecting endpoints and controlling application access.

GuardKnox

GuardKnox

GuardKnox protects the users of connected vehicles against threats that can endanger their physical safety and the safety of their personal information.

NetMonastery DNIF

NetMonastery DNIF

NetMonastery is a network security company which assists enterprises in securing their network and applications by detecting threats in real time.

Corsa Security

Corsa Security

Corsa Security is leading the transformation of network security with a private cloud approach that helps scale network security services with unwavering performance and flexibility.

Crypto Valley Association

Crypto Valley Association

Crypto Valley Association is an independent, government-supported association established to build the world’s leading blockchain and cryptographic technologies ecosystem.

Switchfast Technologies

Switchfast Technologies

Switchfast Technologies is an IT consulting and managed services provider, offering IT support and consulting to Chicagoland small businesses.

Liberman Networks

Liberman Networks

Liberman Networks is an IT solutions provider company that provides security, management, monitoring, BDR and cloud solutions.

Twingate

Twingate

Twingate help organizations secure and manage access to their technology resources in a world where people work from anywhere.

SMARTEST

SMARTEST

SMARTEST is a world-class IT solutions provider active in the most challenging and demanding industries such as the oil and gas industries.

National Cybersecurity Agency (ACN) - Italy

National Cybersecurity Agency (ACN) - Italy

The ACN is the National Authority for Cybersecurity in Italy. the Agency promotes public-private initiatives to strengthen the national cybersecurity and resilience posture.

Cypago

Cypago

Cypago provides a powerful yet easy-to-use Compliance Orchestration Platform to automate the compliance process end-to-end.

Certcube Labs

Certcube Labs

Certcube Labs provide a broad range of services in the areas of Assessments, Development, Risk Advisory, Blockchain, Forensics Investigations, Managed Security Solutions, and IT Security Trainings.

Intertec Systems

Intertec Systems

Intertec Systems is an award-winning, global IT solutions and services provider that specializes in digital transformation, cybersecurity, sustainability, and cloud services.

AI Safety Institute (AISI)

AI Safety Institute (AISI)

The AI Safety Institute’s mission is to minimise surprise to the UK and humanity from rapid and unexpected advances in AI.

BreachBits

BreachBits

BreachBits are on a mission to deliver world-class cyber risk insights continuously at scale in situations where knowing the true risk truly matters.