NEWS > Cybersecurity News


« Back to News

2015-06-04

Review of Organised Cyber Crime

Comparison of Criminal Groups in Cyberspace

2015-06-03

Keeping Passwords Safe From Cracking

Researchers have come up with an effective & easy-to-implement solution for protecting passwords from attackers.

2015-06-01

Hacker’s Into Commercial Airline Systems

Potential vulnerabilities in the US’s pending shift to satellite-based air traffic control from current ground-based systems.

2015-06-01

Iran Suffering a Techno Gap in Cyber Defense

The commander of Iran's Passive Defense Organization thinks the country suffers a technological gap in cyber defense.

2015-06-03

ISIS In The Dark Web Amidst Bitcoin And Crime

ISIS are continuing to explore the Deep Web.

2015-06-01

US DoD Signals Silicon Valley's Importance in CyberWar

The US security apparatus is growing increasingly dependent on Silicon Valley.

2015-06-01

Why Use Bitcoin?

Here are 10 good reasons why it’s worth taking the time to get involved in this virtual currency.

2015-06-01

Obama Authorizes Sanctions Against Hackers

The US goes after overseas attackers when foreign governments won't.

2015-06-01

Will Open Source Save the Internet of Things?

Cloud apps that collect and analyze data are heavily dependent on open source software & standards.

2015-05-26

Cybersecurity: Don’t Bank On It With 3rd Parties

Not knowing that a contractor's employee had access to system passwords is not a valid excuse when your client's records are stolen.

2015-05-26

Pentagon Might Share US Data with Foreign Militaries

Proposed US Cyber Information Sharing Act will permit sharing cyber threat data beyond the United States.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Homeland Security Investigations (HSI)

Homeland Security Investigations (HSI)

Homeland Security Investigations (HSI) is a premier federal law enforcement agency within the Department of Homeland Security (DHS).

Kualitatem

Kualitatem

Kualitatem Inc. is an independent software testing and information systems auditing company

IoT Security Foundation (IoTSF)

IoT Security Foundation (IoTSF)

IoTSF is a collaborative, non-profit organisation with a mission to raise the quality and drive pervasive security in the Internet of Things.

Markel International

Markel International

Markel International is an international insurance company which looks after the commercial insurance needs of businesses. Specialist services include Cyber Risk insurance.

mmCERT

mmCERT

mmCERT is the national Computer Emergency Response Team for Myanmar.

First National Technology Solutions (FNTS)

First National Technology Solutions (FNTS)

First National Technology Solutions is a leading provider of flexible, customized hosted and remote managed services including IT security and compliance.

Exein

Exein

Exein are on a mission to build the world’s first ecosystem for firmware security so that all different types of firmware are secure around the world.

ATIA

ATIA

ATIA provides consulting services in the design and implementation of IT system, Information Security, ISO certification, and professional IT training and education.

Greenwave Systems

Greenwave Systems

Greenwave's AXON Platform enables IoT and M2M network service providers to address security, interoperability, flexibility and scalability from a single IoT platform.

Intrinsyc Technologies

Intrinsyc Technologies

Intrinsyc provides product development services and Edge Computing modules that are helping to take the Internet of Things products to the next level.

Xperien

Xperien

Xperien is a leading South African Information Technology Asset Disposition (ITAD) company.

Elisity

Elisity

Elisity Cognitive Trust is a new security paradigm that combines Zero Trust Network Access and an AI-enabled Software Defined Perimeter.

Visory

Visory

Great businesses depend on great technology. We make sure our clients go to market with enterprise-level technology and world-class security for their data and infrastructure.

SecOps Group

SecOps Group

SecOps Group is a boutique cybersecurity consultancy helping enterprises identify & eliminate security risks on a continuous basis.

Bastazo

Bastazo

Bastazo provides tools for vulnerability and patch management. Focus your cybersecurity operations on vulnerabilities with the highest risk of exploitation.

CyberSecureRIA

CyberSecureRIA

We founded CyberSecureRIA specifically to secure and support RIAs. We exist to secure SEC-registered RIAs, and keep them compliant with cybersecurity regulations.