News

2015-06-01

US DoD Signals Silicon Valley's Importance in CyberWar

The US security apparatus is growing increasingly dependent on Silicon Valley.

2015-06-01

Why Use Bitcoin?

Here are 10 good reasons why it’s worth taking the time to get involved in this virtual currency.

2015-06-01

Obama Authorizes Sanctions Against Hackers

The US goes after overseas attackers when foreign governments won't.

2015-06-01

Malware Remodeled

Malware is getting through enterprise defenses as attackers code new strains and re-clothe old ones.

2015-06-01

Will Open Source Save the Internet of Things?

Cloud apps that collect and analyze data are heavily dependent on open source software & standards.

2015-05-26

Cyber Superstars

If you’re an innovative cyber professional Raytheon want to hire you.

2015-05-26

Cybersecurity: Don’t Bank On It With 3rd Parties

Not knowing that a contractor's employee had access to system passwords is not a valid excuse when your client's records are stolen.

2015-05-26

Pentagon Might Share US Data with Foreign Militaries

Proposed US Cyber Information Sharing Act will permit sharing cyber threat data beyond the United States.

2015-05-26

Top Security Tools to Fight Against Cybercrime

Cybercrime is a massive global threat and US businesses are the No.1 target.Top security professionals name their most valuable security tool.

2015-05-26

US Defense Signals Silicon Valley's Cyberwar Help

The US government has a rapidly growing dependence on Silicon Valley,

2015-05-26

EU’s 'point of no return' if Internet Firms Not Regulated

Amazon, Etsy and Booking.com are all named in a leaked document as having 'undue power' over their markets.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Swivel Secure

Swivel Secure

Swivel Secure is an award winning provider of multi-factor authentication solutions.

Opscura

Opscura

Opscura (formerly Enigmedia) brings the reliable and cautious hands of operations together with the analytical minds of cyber experts and cryptography researchers.

Netteam

Netteam

Netteam designs, implements and services networking solutions for companies of all sizes.

Volatility Foundation

Volatility Foundation

Volatility is an open source memory forensics framework for incident response and malware analysis.

Etonwood

Etonwood

Etonwood specialises in infrastructure and vendor technology recruitment in areas including cloud platforms, cyber security and service management.

ProofID

ProofID

ProofID is a specialist provider of Identity Access Management (IAM) solutions. We focus on the solving the complex needs of the modern enterprise.

CyberRisk Alliance (CRA)

CyberRisk Alliance (CRA)

CyberRisk Alliance is a business intelligence company created to serve the rapidly evolving cybersecurity and information risk management marketplace.

Safe Systems

Safe Systems

Safe Systems provide compliance centric IT services for community banks and credit unions, ensuring that they are kept up to date on current technologies, security risks, and regulatory changes.

E2E Technologies

E2E Technologies

E2E Technologies are a proactive, SLA-beating, managed service provider that busts the common stereotypes surrounding IT.

Halborn

Halborn

Elite blockchain cybersecurity. Award-winning ethical blockchain hackers to secure your stack end-to-end. Far beyond smart contracts.

KingsGuard Solutions

KingsGuard Solutions

KingsGuard Solutions is a San Diego Cybersecurity company that specializes in complex and innovative security solutions for companies throughout Southern California.

CyberUp

CyberUp

CyberUp is a nonprofit organization created to strengthen the cybersecurity workforce. We help employers reimagine how they grow and scale their cybersecurity workforce.

ZILLIONe

ZILLIONe

ZILLIONe is one of Sri Lanka´s top enterprise technology solutions providers.

Two99

Two99

Two99 provide tailored excellence in the areas of E-Commerce, Marketing, Consulting, and Cyber Security.

IONIX

IONIX

IONIX (formerly Cyberpion) is the attack surface management solution that uses Connective Intelligence to shine a spotlight on exploitable risks across your supply chain.

Skillfield

Skillfield

Skillfield is a Melbourne based Cyber Security and Data Services consultancy and professional services company.