FREE TO VIEW


« Back to News

2016-01-04

Turn the Tide on Cyber Security in 2016

By any measurement, 2015 was another bad year for the world in terms of cyber security. Will things get better or worse in 2016?

2016-01-04

Turkish Hackers Threaten To Shutdown Russian Government Websites

Turkish hackers said they’re preparing cyber-attacks on Russian government websites.

2016-01-04

BBC Websites Offline After Massive DDOS Attack

Mysterious new hacking group brought down the BBC websites for several hours in a large-scale DDOS attack.

2016-01-04

Islamic State Aims to Launch Cyberattacks on US

The Islamic State is seeking the ability to launch cyberattacks against US government and civilian targets.

2016-01-04

Apple Opens Fire In Encryption Battle

On one side, Silicon Valley, arguing that weakening encryption puts privacy at risk. On the other, security services, police and governments.

2016-01-04

NSA Helped UK Spies Find Juniper's Security Holes

GCHQ acquired the capability to covertly exploit security vulnerabilities in firewalls made by Juniper Networks, with the NSA's cooperation.

2016-01-04

US Agencies Freak Out Over Juniper Backdoor

Juniper Networks has uncovered unauthorized code in its firewall operating system, allowing attackers to get in and decrypt VPN traffic.

2016-01-02

Criminals Identify Deceased ID as Easy Target

A survey of ex-offenders found strong evidence that criminals are turning towards data-driven crimes over other options.

2016-01-02

Industrial Control Systems Vulnerable

According to ICS-CERT some advanced networks are vulnerable to remote attackers looking to intercept communications to and from devices.

2015-12-30

Getting Workers To 'buy-in' To Cybersecurity

Organizations should make sure their workers understand the importance of cyber security and actively take part in defending their company.

2015-12-29

US Banks Get Tough On Cybersecurity In 2016

National requirements for US banks to include multi-factor authorisation, audits, pen-tests, & exacting third-party vendor cybersecurity scrutiny.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Evidian

Evidian

Evidian, a Bull Group company, is the European leader and one of the major worldwide vendors of identity and access management software.

Deutsche Cyber-Sicherheitsorganisation (DCSO)

Deutsche Cyber-Sicherheitsorganisation (DCSO)

DCSO was founded in 2015 with the aim of counteracting the threats posed by globally organized cybercrime and state-controlled industrial espionage.

Professional Insurance Agents (PIA)

Professional Insurance Agents (PIA)

Professional Insurance Agents (PIA) offer commercial insurance services including Cyber Liability insurance.

Ipsidy

Ipsidy

Our identity platform enables mobile users to more easily authenticate their identity to a mobile phone or portable device of their choosing.

Arete

Arete

Arete is a global cyber risk company whose mission is to transform the way organizations prepare for, respond to, and prevent cybercrime.

Gulf Computer Services Co (GCSC)

Gulf Computer Services Co (GCSC)

Gulf Computer Services is a major player in the field of networking & Communication solutions for emerging industries such as Internet Services and Information Technology in Saudi Arabia.

PSYND

PSYND

PSYND is a Swiss consultancy company based in Geneva specialized in CyberSecurity and Identity & Access Management.

Cyber Covered

Cyber Covered

Cyber Covered provide complete website & data cover with market leading cyber insurance and powerful compliance software in one affordable package.

Civic Technologies

Civic Technologies

Civic’s Secure Identity Platform (SIP) uses a verified identity for multi-factor authentication on web and mobile apps without the need for usernames or passwords.

LogicBoost Labs

LogicBoost Labs

LogicBoost Labs has the expertise, experience, funding and connections to make your startup succeed. We are always interested in new ways to change the world for the better.

Tentacle

Tentacle

Tentacle has developed a configurable data management tool that helps organizations to improve their information security programs and overall security posture.

ZINAD IT

ZINAD IT

ZINAD is an information security company offering state-of-the-art cybersecurity awareness products, solutions and services.

N2K Networks

N2K Networks

N2K Networks is the world’s first “news to knowledge” network. The news to knowledge network is how you stay at the cutting edge in a rapidly changing world.

Corinium Global Intelligence

Corinium Global Intelligence

At Corinium, we have been bringing together the brightest minds in data, AI and info sec since 2013, to innovate at the intersection of technological advancements and critical thinking.

Tychon

Tychon

Tychon develops advanced enterprise endpoint management technology that enables commercial and government organizations to bridge the gap between security and IT operations.

Securitybricks

Securitybricks

Securitybricks specialize in cloud security and compliance. Our mission is to automate regulatory compliance backed by human validation.