FREE TO VIEW


« Back to News

2017-09-18

S. Africa’s Model For Cybesecurity

S. African organisations can no longer afford to operate in isolation in the process era of the 4th Industrial Revolution.

2017-09-15

Cyberwar: A Guide

At its core, cyber warfare is the use of digital attacks by one country to disrupt the computer systems of another to create significant destruction.

2017-09-13

Millions of Instagram Users Hacked

Claims that six million Instagram accounts have been hacked and 'Facebook/Instagram has not yet fully understood the full scope of the exploit'.

2017-09-12

US Conducts Computer War Games in Response to North Korea Missile Launch

The US military and Pacific allies conduct air drills over the Korean peninsula in conjunction with computer attack simulations.

2017-09-12

Disastrous Equifax Breach Exposes 44% Of The US Population

Executives run for cover as credit reporting giant Equifax loses the confidential data of 143m users to criminal hackers.

2017-09-14

US Military Fighting ISIS In Cyberspace

No terrorist group has capitalised on networked technology more than ISIS, both for recruitment messaging and commanding fighters on the ground.

2017-09-14

New AI Claims To Determine If You Are Gay Or Straight.

Hard To Believe: Artificial Intelligence can accurately guess whether people are gay or straight, based on photos of their faces.

2017-09-12

How Dangerous Is ISIS In The Cyber Domain?

ISIS has a wide range of commercial technological capabilities and knows how to use the power of social media to conduct global operations.

2017-09-11

Will Cyber Warfare Remove Kim From N. Korea?

Military invasion. Sending in a hit squad. Tougher sanctions. Maybe there is a safer route to deposing the renegade N Korean leader.

2017-09-07

Will GDPR Protect Privacy Or Just Lead To More Hacks?

Implementation of the new EU Data Protection Regulations will create some unintended and possibly unwelcome consequences.

2017-09-11

Car Industry In Crisis Over AI and Hackers

Car security technology requires broad, sweeping changes in standards and the ways in-vehicle networks and devices are made to become secure.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Stratogent

Stratogent

Stratogent does IT and Cybersecurity operations. We specialize in high-touch and high-change IT environments, especially in the biotech and pharma industry verticals.

Homeland Security Investigations (HSI)

Homeland Security Investigations (HSI)

Homeland Security Investigations (HSI) is a premier federal law enforcement agency within the Department of Homeland Security (DHS).

Integrity360

Integrity360

Integrity360 provide fully managed IT security services as well as security testing, integration, GRC and incident handling services.

Backup112

Backup112

Backup112 has been delivering professional cloud backup services since 2004.

NRD Cyber Security

NRD Cyber Security

NRD Cyber Security create a secure digital environment for countries, governments, and organisations and implement cybersecurity resilience enhancement projects around the world.

Cyber DriveWare

Cyber DriveWare

DriveWare analyzes new traffic in the I/O layer and blocks malware and cyber attacks which organizations have no means to protect against.

GovCERT Austria

GovCERT Austria

GovCERT Austria is the Austrian Government Computer Emergency Response Team. Its constituency consists of Austria's public administration.

Cansure

Cansure

Cansure is a leading insurance provider in Canada offering a broad range of property & casualty insurance solutions including Cyber & Data Breach insurance.

Dataprovider.com

Dataprovider.com

Our Brand Protection Suite gives you the tools to discover trademark infringement on the Internet, such as websites selling counterfeit products, even when this is not immediately noticeable.

Ironhack

Ironhack

Ironhack provide intensive training courses & bootcamps in Web Development, UX/UI Design, Data Analytics & Cybersecurity.

Sontiq

Sontiq

Sontiq is committed to providing best-in-class, highly scalable, award-winning identity security solutions to consumers, businesses and government agencies.

DatChat

DatChat

DatChat Inc. is a blockchain, cybersecurity, and social media company that focuses on protecting privacy on our devices and also protecting our information after we have shared it with others.

CyBourn

CyBourn

Cybourn's diverse offerings include engineering, analysis, product development, assessment, and advisory services in the cybersecurity space.

Kolide

Kolide

Kolide ensures that if a device isn't secure, it can't access your apps.

itm8

itm8

itm8 is a Nordic digital transformation partner offering a wide range of services in IT operations and Cloud Services, Digital Transformation, Application Services, ERP, and Cyber Security.

iConnect IT Business Solutions DMCC

iConnect IT Business Solutions DMCC

iConnect is a trusted IT Solutions and Technology Services company, proudly serving clients across the Middle East and Africa.