News

2016-07-05

Donald Trump, Hillary Clinton & Russian Hackers

Sophisticated hackers are attempting to penetrate the computer networks of all the US Presidential candidates.

2016-07-05

Preventing Hackers From Accessing Financial Information

Combating hackers with voice biometric authentication of customers adds another layer of security to prevent growing fraud.

2016-07-05

IBM Computer To ‘Help’ Accountants

KPMG Australia has signed a deal with IBM to use the Watson supercomputer to do big company audits.

2016-07-05

Hackers Steal $10m From Ukrainian Bank

More grief for the interbank platform SWIFT as hackers extract $millions from an undisclosed bank in Ukraine.

2016-07-04

US & Israel Agree To Co-operate In Cyber Defense

Israel & US agree real-time operational connectivity through the Computer Emergency Response Teams (CERTS) of both nations.

2016-07-04

Is Moscow Trying To Influence The US Presidential Election?

It would seem that Vladimir Putin favours Donald Trump to be US President and is trying to do something about it.

2016-07-01

Frankenstein’s Paperclips

Rules governing the behaviour of AI systems have had currency since Isaac Asimov invented the “Three Laws of Robotics”. Now we need them.

2016-07-01

Government In The Information Age

Alvin Toffller's predictions for the evolution of the Industrial Era into the Information Age are coming true; the role of government must evolve too.

2016-07-01

Edward Snowden’s Lawyer Wants Obama To Give Him A Pardon

An Element Of Absurdity: Edward Snowden's lawyers have vowed to step up pressure on Barack Obama for a Presidential Pardon.

2016-06-30

What Might ‘Brexit’ Mean For Cybersecurity In The UK?

While some cybersecurity pros say that Brexit will have little ill-effect on the industry, others aren't so sure.

2016-06-30

Lessons Learned From Major Healthcare Breaches

Huge amounts of personal health data being collected, shared & analyzed. There are more reasons to worry about patient privacy than ever.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Berkman Klein Center for Internet & Society

Berkman Klein Center for Internet & Society

The Berkman Klein Center for Internet & Society is a research center at Harvard University that focuses on the study of cyberspace.

CUIng.org

CUIng.org

The CUIng initiative was launched to tackle the problem of criminal exploitation of information hiding techniques.

Privitar

Privitar

Privitar is leading the development and adoption of privacy engineering technology enabling our customers to innovate and leverage data with an uncompromising approach to data privacy.

CUJO AI

CUJO AI

CUJO AI is the global leader in the development and application of artificial intelligence to improve the security, control and privacy of connected devices in homes and businesses.

Octane OC

Octane OC

OCTANe is building the SoCal of tomorrow. We drive innovation and growth by connecting people, resources and capital. Our Incubator focus is FinTech, Data Analytics and Cybersecurity.

Montreal International

Montreal International

You’re an entrepreneur planning to launch a company in an innovative sector such as AI, cybersecurity, 'deeptech' or fintech? You’ve found the right place!

Cyberspace Solarium Commission (CSC)

Cyberspace Solarium Commission (CSC)

The Cyberspace Solarium Commission was established to develop a consensus on a strategic approach to defending the United States in cyberspace against cyber attacks of significant consequences.

BlackhawkNest

BlackhawkNest

Blackhawk is the only cyber security solution on the market that combines network monitoring and incident response into a cohesive appliance.

Conversant Group

Conversant Group

Conversant Group is an IT infrastructure and security consulting company, providing technical, organizational, procedural, and process consulting internationally.

Citizen Lab - University of Toronto

Citizen Lab - University of Toronto

Citizen Lab focuses on research and development at the intersection of cyberspace, global security & human rights.

CybersCool Defcon

CybersCool Defcon

CybersCool is committed to educate and train, re-skill and up-skill the current workforce of various industries and businesses in the knowledge and know-how of cybersecurity.

Resourcive

Resourcive

Resourcive is the first Value Added Sourcing “VAS” consultancy. We deliver strategic IT sourcing solutions to mid-market and enterprise clients.

GoTo

GoTo

At GoTo we help people and businesses to connect and collaborate simply and securely – from anywhere. We’re the trusted partner for companies of all sizes.

First Focus

First Focus

First Focus is a managed service provider for medium-sized organisations.

Evo Security

Evo Security

Evo Security is an Identity and Access Management company focused exclusively on serving MSPs, MSSPs and their SMB and Mid-Market customers.

Blue Mantis

Blue Mantis

Blue Mantis is a security-first, IT solutions and services provider with a 30+ year history of successfully helping clients achieve business modernization.