News

2016-07-12

Darktrace Cybersecurity Raises New Funding

Darktrace, a UK based cybersecurity startup that uses artificial intelligence to detect threats gets $65m new investment.

2016-07-12

BMW, Intel and Mobileye Developing Self-Driving Cars

Car manufacturer joins forces with US computer chip giant and Israeli technology firm to bring fully automated driving into production by 2021.

2016-07-18

The Global War of Narratives and the Role of Social Media

The unique characteristic of social media is that it empowers and enables individuals to engage in ways previously unseen. Opinion by Anja Kaspersen.

2016-07-12

Four Threats To Aviation Security – and Four Responses

From terrorist attacks to geopolitical posturing, aviation is reaching the frontline of global security & cyber risks. Opinion by Anja Kaspersen.

2016-07-11

NATO & Pentagon Want Bitcoin Technology

Blockchain technology has many applications. Finance firms want it to cut admin costs & trade faster. Now it’s the military’s turn.

2016-07-11

Did N. Korea Hack S. Korea’s Key Defense Contractor?

Naval shipbuilder Hanjin Heavy Industries & Construction has suffered a serious hack and North Korea is the top suspect,

2016-07-11

Hillary Clinton’s Email Problems Just Get Worse

The FBI has recommended that no charges be brought following its investigation of the former secretary of state's private email server. What next?

2016-07-11

China’s South Sea Cyber War

Beijing's cyber war capabilities could change the strategic balance in Asia, eclipsing the potential danger of rising tensions in the South China Sea.

2016-07-08

Brexit Fallout Continues – ePrivacy

UK losing influence over the EU review of online privacy laws just as the long-running dispute over transatlantic data transfers appears to be settled.

2016-07-08

Cybersecurity Insurance – What Is It? How Does It Work?

Cyber insurance has been around for almost a decade, but is only now becoming a popular safeguard against hackers.

2016-07-07

Chilcot: False Intelligence Led To Iraq Invasion Which Spawned IS

MI6 was misled to believe Saddam Hussein was producing WMD by a false agent who based his reports on a Hollywood action movie.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

RISA

RISA

RISA solutions help to secure networks, improve overall network security, and achieve government regulatory compliance.

Trusted Computing Group

Trusted Computing Group

TCG was formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms.

CrowdStrike

CrowdStrike

CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks.

Evok

Evok

EVOK is an IT Service provider specialized in installing, maintaining and supporting IT infrastructures for SMB's in Switzerland.

ZeroFox

ZeroFox

ZeroFox safeguards modern organizations from dynamic security risks across social, mobile, surface, deep and dark web, email and collaboration platforms.

Entersekt

Entersekt

Entersekt is an innovator in push-based authentication and app security.

Digital Innovation Hub Slovenia (DIH)

Digital Innovation Hub Slovenia (DIH)

DIH Slovenia is a central hub providing services to grow digital competencies in areas including robotics, IoT, cyberphysical systems and cybersecurity.

Cynterra

Cynterra

Cynterra is a next generation cloud cyber security and data analytical service provider offering cloud security compliance, data protection, visibility and threat protection services.

InfoLock

InfoLock

Infolock are experts in data governance, providing consulting and advisory services that help organizations effectively secure, manage, and optimize their data.

Tapestry Technologies

Tapestry Technologies

Tapestry Technologies supports the Department of Defense in shaping its approach to cybersecurity.

RealCISO

RealCISO

RealCISO is a CISO grade cloud platform to help companies understand, manage, and mitigate their cyber risk.

Dutch Institute for Vulnerability Disclosure (DIVD)

Dutch Institute for Vulnerability Disclosure (DIVD)

DIVD's aim is to make the digital world safer by reporting vulnerabilities we find in digital systems to the people who can fix them.

Alias

Alias

Alias (formerly Alias Forensics) provide penetration testing, vulnerability assessments, incident response and security consulting services.

Josef Ressel Centre for Intelligent & Secure Industrial Automation

Josef Ressel Centre for Intelligent & Secure Industrial Automation

The Josef Ressel Centre for Intelligent and Secure Industrial Automation investigates the fundamentals of digital assistants for industrial machines that enable intelligent and secure operation.

Safe Data Storage

Safe Data Storage

Safe Data Storage offer a fully managed, professional, secure UK-based online backup service to businesses, education and charities.

LiveAction

LiveAction

LiveAction’s Network Intelligence platform transforms complex data into actionable insights, providing organizations with a comprehensive view of their network.