2018-09-19

Edward Snowden Reconsidered

Five years since Edward Snowden’s revelations of mass surveillance and his subsequent flight to Moscow, here is a lengthy reflection on his actions.

2018-09-19

Iran Targets Kurds With Spyware

Malware collects the target's mobile data including contact lists, phone call records, SMS messages, geo-location, photos, voice messages and more.

2018-09-19

A Breakthrough In Video Analytics

New AI-based video analytics technology powers a 20x improvement in central monitoring and video review through cutting-edge collection & analysis.

2018-09-19

Snowden Demands A Penalty For Misuse Of Aadhaar Data

The Indian government Aadhaar program is a unique ID that can be obtained by residents of India, using their biometric & demographic data.

2018-09-18

The BA Hack And How Not To Respond To A Cyber Attack

There have been poor responses to cyber attacks on major companies before, but the airline’s actions could be one of weakest in recent history.

2018-09-18

What Every Small Business Should Know About Hackers & Cybersecurity

It’s a case of when, not if, a cyber attack will take place and preparation is the key. You cannot simply leave it the IT department to deal with.

2018-09-18

Students Blamed For University & College Cyber Attacks

Analysis of cyberattacks on UK universities' research and academic networks concludes there must be "suspicions" over staff and students.

2018-09-18

A Cyber Attack Could Cause The Next Financial Crisis

The next crisis might come from a cyber attack that causes disruptions to financial services capabilities, especially global payments systems.

2018-09-17

Iranian Hackers Target Universities For Secret Research

Iranian hackers target academic institutions as part of a major campaign to steal unpublished research and obtain intellectual property.

2018-09-17

Cyber Criminals Are Outspending Business

The cybercrime community spends over $1tn each year developing attacks, compared with the $96bn spent by organisations on security from attacks.

Subscribe!

Directory of Suppliers

Dataconomy

Dataconomy

Dataconomy is the leading portal for news, events and expert opinion from the world of data driven technology.

Rapid Awareness

Rapid Awareness

Rapid Awareness incorporates awareness-raising campaigns designed to help meet international standards and the demands of certification audits.

National Coordinator for Security and Counterterrorism (NCTV)

National Coordinator for Security and Counterterrorism (NCTV)

The National Coordinator for Counterterrorism and Security is responsible for counter-terrorism, cyber security, national security and crisis management.

Ripjar

Ripjar

Ripjar provide a data intelligence platform for analysing and visualising data in realtime. Applications include Cyber Security and Risk & Compliance.

DeviceLock

DeviceLock

DeviceLock is a leading provider of endpoint device/port control and data leak prevention software.

IBackup

IBackup

IBackup is a Web Based Online Backup service provider.

Cloud Security Corp

Cloud Security Corp

Cloud Security offer a suite of solutions that includes Cloud Security, Application Security and Mobile Security (Bring-Your-Own-Device – BYOD).

Norwegian Center for Information Security (NorSIS)

Norwegian Center for Information Security (NorSIS)

NorSIS) is an independent organization that works to increase knowledge and understanding of information security for businesses and individuals.

Protenus

Protenus

Protenus provide a solution to proactively monitor and protect patient privacy in the electronic health record (EHR).

Intrasoft International

Intrasoft International

Intrasoft International is a leading European IT Solutions and Services Group offering a full range of IT services including Information Security.

Sevin Cyber Security

Sevin Cyber Security

Sevin has a proven three step approach which helps companies maintain the integrity of their cyber security.

ThreatQuotient

ThreatQuotient

ThreatQuotient delivers an open and extensible threat intelligence platform to provide defenders the context, customization and collaboration needed for increased security effectiveness.

Hilltop Cybersecurity

Hilltop Cybersecurity

Hilltop Cybersecurity provides a cybersecurity platform to protect businesses from external and internal cyber attack and has also patented a biometric security solution for crypto-currencies.

Bavarian IT Security Cluster

Bavarian IT Security Cluster

The Bavarian IT Security Cluster works to build regional IT security competencies and increase the competitiveness and market opportunities of its member companies.

Plurilock Security Solutions

Plurilock Security Solutions

Plurilock is a real-time cybersecurity solution that uses artificial intelligence to identify, prevent, and eliminate insider threats.