News

2015-09-09

Pentagon to Wage War on DDOS Attacks

New tools enabling the U.S. Defense Department to make a rapid response to distributed denial-of-service attacks.

2015-09-09

Pentagon Increasing Drone Flights By 50%

The Pentagon is planning to increase the number of drone flights by 50% to meet the US demands for surveillance & air strikes.

2015-09-08

Malaysian Police Work with Interpol & FBI to Foil Cyber Warfare Threat

Anonymous Malaysia threaten Internet 'Warfare'

2015-09-08

Hit List: ISIS 'hacking division' Releases Details of 1,400 Military & Government Personnel.

Could Isis’s ‘cyber caliphate’ unleash a deadly attack on key targets?

2015-09-08

US & China Are Escalating Their Cyber War

When competitors become adversaries judging the level of threat and response becomes complicated.

2015-09-07

Cognitive Computing: What Can and Can’t Be Done.

Can computers solve the kinds of woolly, messy problems that humans deal with every day?

2015-09-07

Cyberspies Impersonate Security Researcher

A cyber espionage group turned the tables on a security researcher: the attackers impersonated the researcher in a spear-phishing email attack.

2015-09-07

NSA Gives $300,000 for a Safer Internet of Things

The NSA is funding development for architecture for a "safer" Internet of Things (IoT) to 'design in' better security.

2015-09-11

Assange Advised Snowden To Go to Russia

It was WikiLeaks founder Julian Assange who advised NSA whistleblower Edward Snowden to go to Russia.

2015-09-02

US Insurance Underwriters Launch Cyber Security Program

Insurance Industry support proposals for a reputable certification for Internet of Things products.

2015-09-02

Countdown: 10 Things Cyber Crooks Could Do To Your Computer, Without Even Touching It

Your computer may not have symptoms, but it may still be infected.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Maureen Data Systems (MDS)

Maureen Data Systems (MDS)

Our mission at Maureen Data Systems is to digitally transform business environments with the use of cloud infrastructure, security and privacy controls, data analytics, and managed services.

NCX Group

NCX Group

NCX Group is committed to helping customers identify and mitigate the risks inherent in today’s interconnected environments and business processes.

Celestix Networks

Celestix Networks

Celestix is a global provider of secure network solutions that enable the simple deployment of secure remote access connectivity.

Reed Smith LLP

Reed Smith LLP

Reed Smith LLP is an international law firm with offices in the USA, Europe, Middle East and Asia. Practice areas include Information Technology, Privacy & Data Security.

Guardea Cyberdefense

Guardea Cyberdefense

Guardea Cyberdefense is an IT services company specializing in the management of security projects, with a pool of skills selected from a network of specialized partners.

Optiv

Optiv

Optiv is a market-leading provider of end-to-end cyber security solutions. We help clients plan, build and run successful cyber security programs that achieve business objectives.

Redjack

Redjack

Redjack is a cutting-edge network analytics company focused on enterprise and ISP security and intelligence solutions.

Shift Technology

Shift Technology

Shift Technology provides insurance companies with an innovative SaaS solution to improve and scale fraud detection.

Seconize

Seconize

Seconize empowers enterprises to proactively manage their cyber risks, prioritize remediations, optimize security spending and ensure compliance.

Cyber Security Education

Cyber Security Education

CybersecurityEducation.org is an online directory of cyber security education and careers.

ENAC

ENAC

ENAC is the national accreditation body for Spain. The directory of members provides details of organisations offering certification services for ISO 27001.

Jobsora

Jobsora

Jobsora is an innovative job search platform in the UK and more than 35 other countries around the world. Sectors covered include IT and cybersecurity.

Alpine Security

Alpine Security

Alpine Security provides penetration testing, security assessments and cybersecurity training services.

The PenTesting Company

The PenTesting Company

The PenTesting Company is owned and operated by offensive security professionals. Penetration Testing is essentially all we do.

Alchemy Security Consulting

Alchemy Security Consulting

Alchemy Security Consulting specialise in offensive and defensive cyber security. We find the weak link in your security so you can patch it up fast and avoid being hacked.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.