FREE TO VIEW


« Back to News

2016-02-15

NSA Is Merging Hacker And Anti-Hacker Teams

A reorganisation of the NSA increases pressure on US spies to choose between keeping hackers out – or acting like them to gather intelligence.

2016-02-17

Protect Your Data From Internal Attacks

Threats from inside your network, whether intentionally malicious or unintentionally hazardous, are the biggest security problem.

2016-02-19

US Agreement With The UK Allows Data Access To Private Companies

The US and UK authorities are working on a secret agreement that would allow mutual access to the data of private sector companies.

2016-02-15

Twitter Steps Up Efforts To Combat ISIS

Twitter says it is increasing efforts to combat extremism on the site.

2016-02-15

New Microchip Increases Military Intelligence

A new microchip could transform the 21st century battlefield by bringing massive data crunching power to handheld devices.

2016-02-19

Cybersecurity Is A Great Career Choice

Cybersecurity professionals work on the cutting edge of technology, using highly refined computer-based training. How cool is that?

2016-02-16

Hacker Passes Through FBI Cyber Security With Just One Call

It doesn’t matter how technically secure your data is if it’s protected by gullible humans.

2016-02-15

We Need Social Media With A Heart

Tim Berners-Lee speaks out about the negativity and bullying of much of social media.

2016-02-12

Snowden Leaks Spill Over Into The Courts

There is growing legal debate in the U.S. over the potentially invasive nature of big data cyber-surveillance tools.

2016-02-18

The White House Has A $19 Billion Cybersecurity Plan

Big Bucks: A broad Cybersecurity National Action Plan accompanying the 2017 budget will detail a massive crackdown on lax security,

2016-02-18

Protecting US Innovation From Cyberattack

U.S innovation and its dominance in the digital world gives it a competitive advantage in the global economy. Opinion by Barack Obama

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IBackup

IBackup

IBackup is a Web Based Online Backup service provider.

Lookout

Lookout

Lookout is the data-centric cloud security company that uses a defense-in-depth strategy to address the different stages of a modern cybersecurity attack.

New Zealand Internet Task Force (NZITF)

New Zealand Internet Task Force (NZITF)

The New Zealand Internet Task Force (NZITF) is a non-profit with the mission of improving the cyber security posture of New Zealand.

FRSecure

FRSecure

FRSecure is a full-service information security management company that protects sensitive, confidential business information from unauthorized access, disclosure, distribution and destruction.

National Initiative for Cybersecurity Education (NICE)

National Initiative for Cybersecurity Education (NICE)

NICE is a partnership between government, academia, and the private sector focused on cybersecurity education, training, and workforce development.

NeuroChain

NeuroChain

NeuroChain is an intelligent ecosystem that is more secure, more reliable and much faster than blockchain.

e.Kraal Innovation Hub

e.Kraal Innovation Hub

e.Kraal is a Cybersecurity Innovation Hub whose mission is to secure the future of Cybersecurity in Kenya by accelerating innovation and creativity in the cyberspace ecosystem.

Crown Sterling

Crown Sterling

Crown Sterling delivers next generation software-based, AI-driven cryptography in the form of random number generators and encryption products.

Datacentrix

Datacentrix

Datacentrix provides end-to-end cybersecurity services for the operational technology (OT) and IT environments to monitor, assess and defend our customers' information assets.

OWN

OWN

OWN (formerly SEKOIA) is a major French player in cybersecurity providing tailor-made, informed and adapted cyber support thanks to its DNA of passionate and committed experts.

Arkphire

Arkphire

Arkphire provide solutions across every aspect of IT to help your business perform better.

Krista Software

Krista Software

Krista is an intelligent automation platform that combines iPaaS and Conversational AI to automate complete business processes across your teams and apps.

Security Discovery

Security Discovery

Stay ahead of cyber threats with Security Discovery. We offer expert consulting, comprehensive services, and a powerful vulnerability monitoring SaaS platform.

TrustMe

TrustMe

TrustMe’s integrated platform for business trust and resilience keeps organizations safe, secure, and trustworthy.

Reach Security

Reach Security

Reach is the first generative AI platform purpose-built to empower enterprise security teams. With Reach, organizations measure, manage, and improve their enterprise security posture at scale.

Tyto Athene

Tyto Athene

At Tyto Athene, we harness the power of technology to provide solutions that shape the future.