News

2016-02-19

What Motivates Cyber Criminals?

Most hackers are driven by financial gain, but it turns out the Big Payday is a myth. How much do they really make from crime?

2016-02-16

The Blockchain Will Change The Property Business

Niche industries will be made more secure by the untamperable data record provided by blockchain technology. Including property.

2016-02-17

Microrobot Can Navigate Using Electric Fields

Engineers from Drexel University have devised a bacteria-powered microrobot that can be steered through fluids with applied electric fields.

2016-02-15

NSA Is Merging Hacker And Anti-Hacker Teams

A reorganisation of the NSA increases pressure on US spies to choose between keeping hackers out – or acting like them to gather intelligence.

2016-02-17

Protect Your Data From Internal Attacks

Threats from inside your network, whether intentionally malicious or unintentionally hazardous, are the biggest security problem.

2016-02-19

US Agreement With The UK Allows Data Access To Private Companies

The US and UK authorities are working on a secret agreement that would allow mutual access to the data of private sector companies.

2016-02-15

Twitter Steps Up Efforts To Combat ISIS

Twitter says it is increasing efforts to combat extremism on the site.

2016-02-15

New Microchip Increases Military Intelligence

A new microchip could transform the 21st century battlefield by bringing massive data crunching power to handheld devices.

2016-02-19

Cybersecurity Is A Great Career Choice

Cybersecurity professionals work on the cutting edge of technology, using highly refined computer-based training. How cool is that?

2016-02-16

Hacker Passes Through FBI Cyber Security With Just One Call

It doesn’t matter how technically secure your data is if it’s protected by gullible humans.

2016-02-15

We Need Social Media With A Heart

Tim Berners-Lee speaks out about the negativity and bullying of much of social media.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

SSH Communications Security

SSH Communications Security

SSH Communications Security is a leading provider of enterprise cybersecurity solutions for controlling trusted access to information systems and data.

Cleo

Cleo

Cleo is a leader in secure information integration, enabling both ease and excellence in business data movement and orchestration.

InteliSecure

InteliSecure

InteliSecure offer Professional Services, Security Assessments and Managed Services for data and threat protection.

ABL Cyber Academy

ABL Cyber Academy

ABL provide certified training courses in the field of cyber security and IT project management.

Vector InfoTech

Vector InfoTech

Vector InfoTech is a leader in Industrial Security, Networks, IT and Telecommunications.

IT Security Jobs

IT Security Jobs

IT Security Jobs is a dedicated portal for everything related to IT professionals looking for IT Security jobs.

S4x Events

S4x Events

S4x are the most advanced and largest ICS cyber security events in the world.

Pelta Cyber Security

Pelta Cyber Security

Pelta Cyber Security is the cyber security consulting and solutions division of Softworld Inc. We provide staffing and recruitment services as well as consulting and solutions for outsourced projects.

ABCsolutions

ABCsolutions

ABCsolutions is dedicated to assisting businesses and professionals achieve compliance with federal anti-money laundering regulations in an intelligent and pragmatic way.

Wisetek

Wisetek

Wisetek is a global provider of end-to-end IT Asset Disposition (ITAD), reuse and secure data destruction management services to the world’s leading IT Corporations, data centres and manufacturers.

BATM Advanced Communications

BATM Advanced Communications

BATM Advanced Communications is a leading provider of real-time technologies for networking and cyber security solutions.

Sikich

Sikich

Sikich LLP is a leading professional services firm specializing in accounting, advisory, technology and managed services.

Wing Security

Wing Security

Wing fosters a stronger security culture by engaging SaaS end-users and enabling easy communication with security teams.

ThreatCaptain

ThreatCaptain

ThreatCaptain is a Cybersecurity Leadership Development Company driven to enhance and illuminate cybersecurity risk through strategic alignment and informed business decision-making.

Code First Girls

Code First Girls

Code First Girls are on a mission to close the gender gap in the tech industry by providing employment through free education.

Silicon Valley Cybersecurity Institute (SVCSI)

Silicon Valley Cybersecurity Institute (SVCSI)

SVCSI aims to investigate, develop, and promote technical excellence and the best security practices for dependable and secure systems and applications.