News

2015-06-21

New Snowden Documents Reveal US Spying Has Actually Expanded

U.S Surveillance of international Internet traffic is expanding in the search for evidence of malicious computer hacking.

2015-06-21

Understand Mobile Deep Linking

Dozens of startups have launched around using, improving & discovering deep links. So, what are deep links and where did they come from?

2015-06-19

What’s in the New UK Surveillance Bill?

The government intend wholesale reform but will it perpetuate invasion of privacy or put an end mass surveillance?

2015-06-19

Got Good Cyber Insurance Cover? Beware of Holes in Your Policy.

Just because you have “cyber insurance” doesn't mean your insurer will pay a cyber-related claim.

2015-06-18

Digital Currencies: A Gold Standard for Bitcoin

Bitcoin-like currencies backed by the yellow metal show promise for crisis-scarred libertarians.

2015-06-17

UK MOD to Build Open Source Analytics Platform

The MOD wants a new open source analytics platform to help understand its data.

2015-06-16

Australia is 'one of most aggressive' in Mass Surveillance

Snowden supporters say Australia’s new data retention laws are 'dangerous'.

2015-06-16

Hackers Offered $1k for Vulnerabilites Found in Drupal 8

The Drupal security team are turning to white hat hackers to get higher levels of security.

2015-06-16

Flash Player Attacked in Latest Cyber-Crime

Hackers' persistent attacks on Adobe Flash Player's obsolete editions get worse.

2015-06-16

PWC 2015 Information Security Breaches Survey

PWC survey aims to provide greater awareness amongst UK business on how companies are (not) mitigating cyber risks.

2015-06-16

GCHQ Lack Staff for 'umbrella' Cyber Surveillance

Do GCHQ have enough skilled people to carry out effective mass surveillance?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Corero Network Security

Corero Network Security

Corero Network Security is dedicated to improving the security of the Internet through the deployment of its innovative DDoS & Network Security Solutions.

ManagedMethods

ManagedMethods

ManageMethods Cloud Access Monitor is the only Cloud Access Security Broker (CASB) that can be deployed in minutes, with no special training, and with no impact on users or networks.

ATIS Systems

ATIS Systems

ATIS Systems offers first-class complete solutions for legal interception, mediation, data retention, and IT forensics.

SMESEC

SMESEC

SMESEC is a lightweight Cybersecurity framework for protecting small and medium-sized enterprises (SME) against Cyber threats.

Blaze Information Security

Blaze Information Security

Blaze Information Security is a privately held, independent information security firm born from years of combined experience and international presence.

Austrian Institute of Technology (AIT)

Austrian Institute of Technology (AIT)

AIT is Austria's largest research and technology organisation and a specialist in the key infrastructure issues of the future including data science and cybersecurity.

Soffid

Soffid

Soffid provides full Single-Sign-On experience and full Identity and Access Management features by policy-based centralised orchestration of user identities.

Trusted Connectivity Alliance (TCA)

Trusted Connectivity Alliance (TCA)

Trusted Connectivity Alliance is a global, non-profit industry association which is working to enable a secure connected future.

CyberEdBoard

CyberEdBoard

CyberEdBoard is a private, peer-to-peer education and networking community focused on cybersecurity, technology, business processes and risk management.

SafeStack Academy

SafeStack Academy

SafeStack Academy is an online cyber security and privacy education platform. Our content is designed by experts to suit small businesses, growing companies, and development teams.

Cyberani Solutions

Cyberani Solutions

Cyberani Solutions was created to fulfill the cybersecurity needs of industry and government in Saudi Arabia, and across the Middle East and North Africa regions.

Sendmarc

Sendmarc

Sendmarc automates the process of protecting your domain from being used in email impersonation and phishing attacks.

AuthMind

AuthMind

Prevent your next identity-related cyberattack with the AuthMind Identity SecOps Platform. It works anywhere and deploys in minutes.

SEALSQ

SEALSQ

For the last 25 years, SEALSQ have been developing secure semiconductor chips, secure embedded firmware, and tested hardware provisioning services to serve the vision of a safer connected world.

CyberSG TIG Centre

CyberSG TIG Centre

CyberSG TIG Centre aims to propel Singapore as the world’s premier cybersecurity innovation hub for economic growth.

Sansec Technology

Sansec Technology

Sansec Technology is dedicated to the research and development of cryptographic products and solutions for cyber security.