News

2016-08-15

Rio Olympics Hacking Threats

World-class athletes aren't the only ones preparing for the Olympic Games. World-class cybercriminals are also hoping to leave with gold.

2016-08-19

Google Uses AI To Save On It’s Energy Bills

Its artificial intelligence division, DeepMind, has cut Google's data centres' energy consumption by 15%, using a machine-learning algorithm.

2016-08-19

CISOs Need Teamwork & A Strategic Framework

Companies may not fully understand the nature of modern threats. Simply placing a higher priority on security may not lead to improved measures.

2016-08-19

New Airport Security Technology

Threats from terrorism & international crime are prompting a big effort by civil aviation to develop new screening technologies.

2016-08-17

Israeli Business Expands Its Cyber Footprint

Israel Aerospace Industries (IAI) is making big strides growing its cybersecurity business.

2016-08-18

Turning Big Data into Smart Data

Big Data has become one of the key buzzwords for businesses everywhere. But Without structure any amount of data is unusable.

2016-08-17

Ransomware Hackers Are Getting More Advanced

Hackers are using increasingly advanced techniques of the kind more commonly seen in cyber-espionage.

2016-08-16

What Executives Really Should Know About Social Media

Executive social media accounts are the first places many malicious attackers go when gathering target intelligence.

2016-08-16

What Makes A Data Scientist?

What does it take to have a brilliant career in the hottest sector in the technology industry? It all starts with mathematics....

2016-08-17

Cybersecurity Due Diligence Is Critical

The potential costs of cybersecurity problems to public companies are simply enormous.

2016-08-17

Easy: Hackers Take Down A Hospital

Using only a few USB sticks, hackers got into the hospital network, taking over medicine-dispensing devices. Death was a literal keystroke away.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Detectify

Detectify

Detectify is a web security service that simulates automated hacker attacks on your website, detecting critical security issues before real hackers do.

Assuria

Assuria

Assuria Cyber Security solutions provide protective monitoring of systems and user activity across the whole IT infrastructure.

RedShield Security

RedShield Security

RedShield is the world's first web application shielding-with-a-service company.

Centro de Gestion de Incidentes Informaticos (CGII) - Bolivia

Centro de Gestion de Incidentes Informaticos (CGII) - Bolivia

CGII is the Computer Incident Management Center of the State of Bolivia.

Data Security Inc

Data Security Inc

Data Security, Inc. is the leading American manufacturer and supplier of hard drive degaussers, magnetic tape degaussers as well as hard drive and solid state destruction devices.

Innovasec

Innovasec

Innovasec provide information security consulting and training services.

Ackcent Cybersecurity

Ackcent Cybersecurity

Ackcent's mission is to help our clients to protect their critical digital assets by providing them with a portfolio of specialised professional services.

Prodera Group

Prodera Group

Prodera Group is a specialist technology consulting partner trusted to help navigate the complex and dynamic lifecycle of change and transformation.

OmniCyber Security

OmniCyber Security

Omni is a cyber security firm specialising in Penetration Testing, Managed Security and Compliance.

Vala Secure

Vala Secure

Vala Secure is a cybersecurity and compliance consultancy that always stays ahead of regulations, future threats and ever-changing security environments.

Adversa AI

Adversa AI

Adversa's mission is to build trust in AI and protect AI from cyber threats, privacy issues, and safety incidents.

StealthPath

StealthPath

StealthPath is focused on endpoint protection, securing the “implicit trust” vulnerabilities of current leading information security solutions.

IT-Schulungen.com / New Elements GmbH

IT-Schulungen.com / New Elements GmbH

Under the name IT-Schulungen.com, the Nuremberg-based New Elements GmbH has been operating one of the largest training centres in the German-speaking world for over 20 years.

SafeShark

SafeShark

SafeShark are Product Security and Telecommunications Infrastructure (PTSI) Act and Radio Equipment Directive (RED) compliance specialists.

NSI Global

NSI Global

NSI Global is a specialist Global Risk and Intelligence Advisory Firm. We specialise in Risk Consulting, Security Intelligence, Geopolitical Intelligence, Cyber Security, Digital Forensics, and TSCM.

SITE Intelligence Group

SITE Intelligence Group

For over two decades, SITE Intelligence Group has provided customers with critical actionable intelligence and analysis on terrorist and violent extremist online networks.