News

2016-05-23

Unified Cyber Command To Help US React Faster

Defense leaders are contemplating elevating US CyberCom to a full-fledged unified command.

2016-05-20

Enhanced Attribution Program To Identify & Track Hackers Worldwide

Pentagon researchers want to consistently identify virtual personas and individual malicious cyber operators across different endpoint devices.

2016-05-18

'Guccifer' Claims He Got Inside Hillary Clinton's Server

Romanian hacker claims to have gained access to the former US Secretary of State's Clinton's "completely unsecured" server.

2016-05-16

Bank Launches Big Data Insight Product For SMEs

A new online service to provide insights and deeper analysis of customer transactions and highlight behaviour and spending patterns.

2016-05-13

Swiss Defense Ministry Targeted

Russian hackers suspected of industrial espionage.

2016-05-13

Can FinTech Supersede Financial Services Workers?

The world of finance is being transformed by emerging technologies, and that will mean lots of lost jobs.

2016-05-13

Tech Jobs Would Be Great, If It Wasn’t For The Users

IT jobs would be so much better if they didn’t have to deal with other people.

2016-05-13

Exposing Cybercrime As A Business Model

Trustwave reveal how sophisticated criminal organizations are most likely to attack, and more importantly, how potential victims can defend their assets

2016-05-11

Spying On You In Britain

Since the late 1990s UK agencies have collected bulk personal data about many people who are “unlikely to be of intelligence or security interest”.

2016-05-12

IS Forms Mega Hacking Group

The super hacking unit is labeled United Cyber Caliphate (UCC).

2016-05-11

Hit By DDoS? You Will Be Hit Again…

More than 80% of DDoS victims are attacked a second time.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clavister

Clavister

Clavister is a network security vendor delivering a full range of network security solutions for both physical and virtualized environments.

Mako Networks

Mako Networks

The Mako System is an award winning networking and security service designed specifically for SMEs and branch offices of larger organisations.

ESTsecurity

ESTsecurity

ESTsecurity is a leading company in cyber security providing intelligent security solutions to make world more secure.

3Elos

3Elos

3Elos operates in the Information Technology market with a focus on research, development, consulting, marketing and implementation of Information Security solutions.

Accredia

Accredia

Accredia is the national accreditation body for Italy. The directory of members provides details of organisations offering certification services for ISO 27001.

International Data Sanitization Consortium (IDSC)

International Data Sanitization Consortium (IDSC)

IDSC is a group composed of individuals and companies dedicated to standardizing terminology and practices across the data sanitization industry.

IdentityIQ

IdentityIQ

IdentityIQ is a US-based identity theft and credit protection company designed to help users stay on top identity thieves and data breaches.

SimSpace

SimSpace

SimSpace is the visionary yet practical platform for measuring how your security system responds under actual, sustained attack.

Cyber Smart Defense

Cyber Smart Defense

Cyber Smart Defense is a specialist provider of penetration testing services and IT security audits.

EnigmaSoft

EnigmaSoft

EnigmaSoft is known for its PC anti-malware remediation utility and service under the tradename SpyHunter.

Virtue Security

Virtue Security

Virtue Security are specialists in web application penetration testing.

Packetlabs

Packetlabs

Packetlabs specializes in penetration testing services and application security.

Communicate Technology

Communicate Technology

Communicate Technology are IT, telecoms and cyber-security specialists, keeping over 500 businesses and 50,000 users connected and secure across the UK.

Vigilant Ops

Vigilant Ops

Vigilant Ops is a leader in Software Bill of Materials (SBOM) Automation. A proactive approach to cybersecurity with continuous vulnerability monitoring.

Price Forbes

Price Forbes

Building on more than 100 years of specialist insurance broking, Price Forbes partner with clients around the world who are looking to understand and balance today’s risk and plan for the future.

Anthropic

Anthropic

Anthropic is a Public Benefit Corporation, whose purpose is the responsible development and maintenance of advanced AI for the long-term benefit of humanity.