NEWS > Cybersecurity News


« Back to News

2015-04-02

Battle for African Internet Users Stirs Fears

Google and Facebook are at the forefront of a scramble to win over new African Internet users.

2015-04-02

Building a Cyber Security Team from Within

Building an in-house cyber security operations center may be resource-intensive but it can safeguard your data.

2015-04-02

China Admits to Having Cyber Warfare Units

China has finally admitted that it has cyber warfare units and plenty of hackers attached with them.

2015-04-01

Israel Girds Itself for Cyber Warfare

Israel is preparing for escalating cyberwar.

2015-04-01

Iran has Built a Cyber Army Faster than Imagined.

Iran has increased its cybersecurity spending 12-fold.

2015-04-01

Will New US Cybersecurity Laws Actually Improve Security?

The US Congress just passed a Cybersecurity Bill that may actually damage cybersecurity.

2015-04-01

MI6 is in a Technology Race with Terrorists and Criminals

Britain’s intelligence agencies are engaged in a “technology arms race” with terrorists & cybercriminals the head of MI6 has warned.

2015-03-30

Talk of Cyber Attack as Huge Power Outages Hit Turkey

Dozens of Turkish cities were hit by a massive power outage on Tuesday - could Iran be responsible?

2015-03-30

Threat Lessons from Sony and Anthem

The cyberattack on Sony Pictures and Health Insurer Anthem have left plenty of unanswered questions.

2015-03-30

A Simple Guide to GCHQ's Hacking Powers

New documents released by the UK government and privacy advocates give a glimpse of how GCHQ operates.

2015-03-31

Anonymous vs ISIS: the ongoing skirmishes of #OpISIS

Anonymous has been doing what it does best: hunting people. And now they are after ISIS.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CDW

CDW

CDW is a leading multi-brand provider of information technology solutions to business, government, education and healthcare customers in the United States, the United Kingdom and Canada.

Defense Advanced Research Projects Agency (DARPA)

Defense Advanced Research Projects Agency (DARPA)

DARPA's mission is to develop breakthrough technologies for national security. The Information Innovation Office undertakes cyber security activities.

NetMotion Software

NetMotion Software

NetMotion Software specializes in mobile performance management solutions to manage, secure and support the mobile enterprise.

Boxcryptor

Boxcryptor

Boxcryptor encrypts your sensitive files before uploading them to cloud storage services.

CERT Bulgaria (CERT.BG)

CERT Bulgaria (CERT.BG)

CERT Bulfaria is the National Computer Security Incidents Response Team for Bulgaria.

Subex

Subex

Subex leverages its award-winning telecom analytics solutions in areas such as Revenue Assurance, Fraud Management, Asset Assurance and Partner Management, and IoT Security.

VNT Software

VNT Software

VNT's vision is to change the way complex IT problems are resolved by predicting business disruptions before they occur.

Nouveau

Nouveau

Nouveau Solutions is a specialist IT managed services company with a strategic focus on delivering cloud, infrastructure, compliance, network and security solutions.

Prescient

Prescient

Prescient’s Cyber solutions supplement your firm’s existing data security infrastructure with specialized investigations that identify unconventional cyber risks.

Red Snapper Recruitment

Red Snapper Recruitment

Red Snapper Recruitment is a market leading staffing services provider to the law enforcement, cyber security, offender supervision and regulatory services markets.

Trusted Objects

Trusted Objects

Trusted Object's mission is to provide state of the art security solutions and services enabling a strong root of trust for the IoT ecosystem.

Plexal

Plexal

Plexal is East London's innovation centre and co-working space. We offer startups flexible memberships, giving them access to office space plus all the benefits and support they need to scale.

Tapestry Technologies

Tapestry Technologies

Tapestry Technologies supports the Department of Defense in shaping its approach to cybersecurity.

RevBits

RevBits

RevBits provides high-performance cybersecurity solutions including email security, endpoint security, deception technology and PAM solution to enterprise companies and public sector organizations.

Consistec Engineering & Consulting

Consistec Engineering & Consulting

Consistec Engineering & Consulting GmbH is an information technology and services company offering solutions for monitoring the security of IT and OT infrastructure.

IriusRisk

IriusRisk

IriusRisk is an open Threat Modeling platform that automates and supports creating threat models at design time.