News

2014-12-04

Why REGIN Isn't The New STUXNET

Stuxnet was designed for sabotage, whereas Regin was likely designed for espionage and as a result was deployed with a great deal more of precision.

2014-12-01

MH370: new drift improves search in Australia

Australia is working on new drift modeling to expand the geographical area in which wreckage from missing Malaysia Airlines flight MH370 may come ashore, the Australian search coordinator said on Wednesday.

2014-05-06

Most UK Police Forces don’t investigate Cyber Crime

Ninety Percent of the UK’s Police have no Tactical or Strategic plans for monitoring, training PCs and reducing cyber crime.

2014-07-22

10 Cyber Security Predictions for 2015

Active defensive and offensive security continues to rise

2014-09-29

Desmond investment bets on spooks to win cyber war

There are few Irish investors better than Dermot Desmond at spotting the next big thing. His latest investment in Vahna, a cyber-security firm, comes less than two years after Edward Snowden began to massively leak information about the secret world of technology espionage.

2014-10-08

Why we need Tor now more than ever

Since Edward Snowden leaked documents demonstrating the breadth of the National Security Agency’s digital surveillance last year, the global conversation around Internet freedom has shifted from censorship to surveillance. Where once the focus was on China’s Great Firewall or Iran’s vision of a “halal Internet,” now eyes are trained on the use of FinFisher for targeted surveillance or the NSA’s global dragnet.

2014-10-23

Is Big Data the Best Preparation Against Natural Disasters?

Big Data and Open data and analytics have become fundamental tools in disaster reparedness, experts say. But public officials aren’t using them enough.

2014-11-27

Financial services now on the 'front line' of Cyber

Financial services are the front lines for a lot of the cyber battles being sparked today. The reason why is simple - that’s where the money is.

2014-06-12

Worlwide Crackdown on Hackers

Two major events targeting Hackers show growing international concern across governments over the growing impact and extent of Cybercrime.

2014-06-19

Massive eBay Hack – 145m Users Affected

A database containing millions of eBay user data, including passwords has been hacked.

2014-06-27

Two weeks to save your computer from major cyber attack.

The UK National Crime Agency teamed up with the FBI and other cybercrime experts to take down a criminal network’s ‘command-and-control’ – but admit they cannot keep it down for long.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

SecureAuth

SecureAuth

SecureAuth delivers cutting edge identity and information security solutions for cloud, mobile, web, and VPN systems.

Bloombase

Bloombase

Bloombase is the leading innovator in Next-Generation Data Security solutions for Global 2000-scale organizations

TUV Sud

TUV Sud

TÜV SÜD is one of the world's leading technical service organisations. Services offered include industrial cyber security.

Mixed Mode

Mixed Mode

Mixed Mode is a specialist in embedded and software engineering for applications including IoT and secure embedded systems.

Information System Security Directorate (ISSD) - Afghanistan

Information System Security Directorate (ISSD) - Afghanistan

Information System Security Directorate (ISSD) is the Directorate of MCIT responsible for the security of critical information infrastructures in Afghanistan.

UPX Technologies

UPX Technologies

UPX Technologies is one of the largest digital security centers in Brazil providing full protection for data, networks and content.

Bitfury Group

Bitfury Group

Bitfury Group is the largest full-service blockchain technology company in the world.

RackTop Systems

RackTop Systems

RackTop Systems is the pioneer of CyberConverged data security, a new market that fuses data storage with advanced security and compliance into a single platform.

About Cyber Security.

About Cyber Security.

About Cybersecurity provides a galaxy-wide knowledge base of cybersecurity tactics and techniques derived from actual experience.

Networks Unlimited

Networks Unlimited

Networks Unlimited is a leading value-added distributor in Africa, providing technology solutions with a focus on security, networking, enterprise systems management and cloud technologies.

Synamic Technologies

Synamic Technologies

Synamic Technologies was founded in 2018 as a start-up to automate cyber security processes. Our CISOSCOPE product automates vulnerability management, risk management and compliance.

Acronis

Acronis

At Acronis, we protect the data, applications, systems and productivity of every organization – safeguarding them against cyberattacks, hardware failures, natural disasters and human errors.

Ruptura InfoSecurity

Ruptura InfoSecurity

Ruptura InfoSecurity provide CREST Accredited Penetration Testing & Offensive Security Services. We secure your critical assets through targeted and research driven penetration testing.

DIGISOC

DIGISOC

DIGISOC, a leader in Latin America in Cybersecurity solutions, combines machine learning with human intelligence to be effective in detecting cyber threats.

ZeroGPT

ZeroGPT

ZeroGPT.com stands at the forefront of AI detection tools, specializing in the precise identification of ChatGPT-generated text.

Securily

Securily

Securily offers the ultimate solution for small to medium-sized businesses, blending cutting-edge AI with expert human insight to deliver the world’s easiest and most effective pentesting experience.