News

2015-07-06

Cyber Command: A War That Started Long Ago

Israel's decision to establish a cyber command is symbolic. The IDF has been active in cyber wars for years.

2015-07-07

Legality of Target Acquisition: The U.S. Needs a Drone Board

Judge With a Finger on the Trigger? Target acquisition In the lethal drone program is about to become the subject of legal due process.

2015-07-07

The Future Of Algorithmic Personalisation

The content we encounter online seems to repeat the same things again and again. Is there something wrong with personalisation?

2015-07-07

The Changing Face of Cyber Risk for Law Firms

Law firms are a target of choice for cyber criminals due to their frequent & sizeable money transfers.

2015-07-06

China tightens grip over the Internet

US trade groups are worried that China's security policies could stifle their business.

2015-07-06

Keep Calm and Spy On: Why the OPM Hack Won’t Bring Down US Intelligence

The Wilderness of Mirrors: Nothing happened, nothing to see here, move along please ...

2015-07-06

Is The Tech Investment Bubble About To Burst ?

Is the tech industry is in denial about looming threats? There are sufficient indicators for those willing to open their eyes.

2015-07-06

Tough Rules Force Kenyan Net Users to List their Gadgets

Kenyans using public Wi-Fi to connect to the Internet will be required to register their mobile devices.

2015-07-03

Some Notes About Wassenaar

Wassenaar is an international arms control treaty which has recently added cyberweapons, with painful consequences for IT research.

2015-07-03

World Faces 'bloodless' Cyber War says India’s PM

"A Digital India where cyber security becomes an integral part of national security"

2015-07-03

Police campaign: UK Cybercrime Surges 27% in 2015

The 'Not With My Name' campaign will be highlighting advice focused on helping people protect their personal information.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Egress Software Technologies

Egress Software Technologies

Egress Software Technologies is a leading provider of data security services designed to protect shared information throughout its lifecycle.

Certis

Certis

Certis is a leading advanced integrated security organisation that develops and delivers multi-disciplinary security and integrated services.

Dracoon

Dracoon

DRACOON is market leader in the German-speaking region for secure enterprise file sharing.

Axonius

Axonius

Axonius is the only solution that offers a unified view of all assets and their coverage, empowering customers to take action to enforce their organization’s security policies.

MOXFIVE

MOXFIVE

MOXFIVE is a specialized technical advisory firm founded to bring clarity to the complexity of cyber attacks.

VLATACOM Institute

VLATACOM Institute

Vlatacom Institute is privately owned accredited research and development institute, system integrator and turn-key solution provider. Areas of expertise include encryption and authentication.

NOW Insurance

NOW Insurance

NOW Insurance provides small business owners and other professional classes with a seamless purchasing experience for general liability, professional liability, and cybersecurity insurance coverage.

Evina

Evina

Evina offers the most advanced cybersecurity and fraud protection for mobile payment.

The ATOM Group

The ATOM Group

ATOM builds and secures technology for regulated industries. We design and build for a future we can all trust.

Aura

Aura

Aura is a mission driven technology company dedicated to creating a safer internet for everyone. We’re making comprehensive digital security that's simple to understand and easy to use.

Open Quantum Safe (OQS)

Open Quantum Safe (OQS)

The Open Quantum Safe (OQS) project is an open-source project that aims to support the development and prototyping of quantum-resistant cryptography.

Timus Networks

Timus Networks

Timus Networks enables today's work from anywhere organizations to secure their networks very easily and cost effectively.

IPKeys Cyber Partners

IPKeys Cyber Partners

IPKeys Cyber Partners, together with the IPKeys Power Partners unit, provide Cyber Security and CIP Compliance for utilities, grid operators and public safety organization across the USA.

Guardey

Guardey

Guardey protects thousands of SME's environments. Whether your team works at the office, at home, at the customer or remotely. We protect your business. We do this in an accessible and affordable way.

Core to Cloud

Core to Cloud

Core to Cloud provide consultancy and technical support for the planning and implementation of sustainable security strategies.

AKIPS

AKIPS

AKIPS develops the world's most scalable network and infrastructure monitoring software, delivered as a turn-key software appliance.