News

2016-01-25

US Says China Stole Military Robot Designs

Chinese army allegedly hacked a QinetiQ specialist who worked on embedded software in microchips that control military robots.

2016-01-25

World Economic Forum Says Cyber-attack Is A Top Risk To Business.

In 140 economies cyber-attacks rank in the top ten threats in 2016.

2016-01-22

2016 Is On The Cusp Of A Machine Revolution

The convergence of technologies across sensors, networks, artificial intelligence and robotics is making amazing things possible.

2016-01-20

UK Police Deploy Drone-Jamming Technology at Major Public Events

British police are planning to use sophisticated unmanned aerial vehicle (UAV) detection & jamming technology to detect terrorist threats.

2016-01-22

2016 Cyber Threat - Use To Advantage

Here are seven predictions for threat activity in 2016 from Security Week.

2016-01-20

Commercial Opportunities To Be Found In Security Problems

It's not only a vital defensive measure. There's money to be made from securing company data.

2016-01-20

Fighting Cybercrime Can Be Turned Into A Commercial Opportunity

Companies can use security initiatives to improve their customers’ experience and drive greater sales.

2016-01-19

Mentoring Startups: Technology Solving Education Problems

One to One: Startups are using online mentorship to combine the strengths of technology with the unique value of human beings.

2016-01-20

Hefty Fine Over False Encryption Claims

Dental software company pays a penalty for misleading customers on the level of encryption it provided to protect sensitive patient data.

2016-01-20

Anonymous Want Revenge For Saudi Executions

Hackers have targeted Saudi Arabia's Ministry of Defence website with a sustained DDoS attack.

2016-01-21

Russian Hackers Warn EU Trains Are Vulnerable to Hijack

Russian hackers have exposed gaping holes in computer systems that control train networks across Europe.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CERT.hr

CERT.hr

CERT.hr is the national authority competent for prevention and protection from computer threats to public information systems in the Republic of Croatia.

Beachhead Solutions

Beachhead Solutions

Beachhead's SimplySecure is a configurable, web-based management tool allowing you to remotely secure vulnerable mobile devices in your organization.

Vitrociset

Vitrociset

Vitrociset design complex systems for defence, homeland security, space and transport. Activities include secure communications and cybersecurity.

RiskIQ

RiskIQ

RiskIQ is the leader in digital threat management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence.

Aricoma

Aricoma

Aricoma are Architects of Digital. We aim to become a major player in end-to-end IT services and digital transformation in Europe.

Utility Cyber Security Forum

Utility Cyber Security Forum

The Utility Cyber Security Forum offers a focused venue in which utility executives can network one-on-one with colleagues facing issues in protecting against cyber attacks.

FraudScope

FraudScope

FraudScope is an AI-assisted platform that accelerates the identification of fraud, waste, and abuse.

Center for Education & Research in Information Assurance & Security (CERIAS)

Center for Education & Research in Information Assurance & Security (CERIAS)

CERIAS is one of the world’s leading centers for research and education in areas of information and cyber security.

The Cyber AB

The Cyber AB

The Cyber AB is the official accreditation body of the Cybersecurity Maturity Model Certification (CMMC) Ecosystem.

Enclave Networks

Enclave Networks

Our mission is to give IT professionals a simple way to rapidly build secure connectivity between any application, computer system, device or infrastructure - regardless of the underlying network.

Perch Security

Perch Security

Perch is a co-managed threat detection and response platform backed by an in-house Security Operations Center (SOC).

Bionic

Bionic

Bionic is an agentless way to get control over your increasingly complex applications so you can manage, operate, and secure them faster and more efficiently.

Porto Research, Technology & Innovation Center (PORTIC)

Porto Research, Technology & Innovation Center (PORTIC)

PORTIC brings together several research centers and groups from P.PORTO in a single space, forming a superstructure dedicated to research, technology transfer, innovation and entrepreneurship.

Pentesec

Pentesec

Pentesec is a security specialist offering professional services, managed security services and expertise within an extensive range of security technologies.

Northdoor

Northdoor

Northdoor provides a comprehensive set of services around information security and works with leading global technology vendors to deploy and manage cyber security solutions.

AnzenSage

AnzenSage

AnzenSage is a cybersecurity advisory consultancy specializing in security risk resilience for the food sector: agriculture, food manufacturing, food supply chain, vineyards, and wineries.

True North Solutions

True North Solutions

True North Solutions provides a wide range of fully customized, vendor-neutral industrial engineering and OT automation solutions to companies across North America and around the world.