NEWS > Cybersecurity News


« Back to News

2019-10-30

Georgia Suffers A Nationwide Cyber Attack

The national TV station, justice system, thousands of websites including private companies, knocked offline and replaced with a threatening message.

2019-10-25

Protect Your Organisation From Employee Data Theft

Too few organisations pay attention to the risk that their own employees present to data security, be it by accident or by intention.

2019-10-24

The Cyberthreat Handbook

Reading List: Thales and Verint have produced an analysis of the activities of approximately 60 major groups of cyber attackers throughout the world.

2019-09-26

Old Magecart Domains Come Back To Life

A consortium of malicious hacker groups who target online shopping cart systems known as Magecart are repurposing some old tools.

2019-09-25

Attack On Ukraine's Power Grid Targeted Transmission Stations

Crash Override: The experts at Dragos have recreated the 2016 attack timeline which knocked out the power supply to Ukraine's capital city.

2019-09-24

Thomas Cook In A Cyber Collapse

The 150,000 holiday-makers stranded by the failure of Thomas Cook are at risk of a wave of online fraud as they make their way home.

2019-09-24

Who’s Afraid Of Huawei?

Understanding the 5G Security Concerns: Can the risks of using the Chinese tech giant's mobile network technology be mitigated?

2019-09-17

Human Participation Lies Behind 99% Of Cyber Attacks

Only a tiny fraction of attacks target software and IT systems. The vast majority of cyber crime requires some level of human input to happen.

2019-09-17

Smart Cities Call For Mobile Solutions

App-based physical security intelligence & access control technology that helps to build secure smart cities, campuses and perimeters.

2019-09-13

A Virtual Geospatial Fence On Network Access

Protection of IT networks requires a multi-layered approach that incorporates user training and security technologies, including Geo-fencing.

2019-09-11

New Ransomware Formats Double

Many more attacks are gaining access to company networks using exposed remote access points to insert new forms of file-locking ransomware.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DCL Search & Select

DCL Search & Select

DCL Search & Selection connect candidates to the best companies in the IT Security, Telco, UC, Outsourcing, ERP, Audit & Control markets.

Atos

Atos

Atos provides a unique Cyber Security end to end solution with a data-centric and pre-emptive security approach.

Blue Lights Digital

Blue Lights Digital

Blue Lights Digital have developed a range of platforms to support digital investigations, as well as providing continued support and education for investigations professionals.

Preempt Security

Preempt Security

The Preempt Platform delivers adaptive threat prevention that continuously preempts threats based on identity, behavior and risk.

macmon secure

macmon secure

macmon secure develops network security software, focussing on Network Access Control.

TorGuard

TorGuard

TorGuard is a Virtual Private Network services provider offering secure encrypted access to the internet.

Cyber Security Raad (CSR) - Netherlands

Cyber Security Raad (CSR) - Netherlands

The Cyber Security Council (CSR) is a national, independent advisory body of the Dutch government undertaking efforts at strategic level to bolster cyber security in the Netherlands.

Statice

Statice

Statice develops state-of-the-art data privacy technology that helps companies double-down on data-driven innovation while safeguarding the privacy of individuals.

Panorays

Panorays

Panorays automates third-party security lifecycle management. It is a SaaS-based platform, with no installation needed.

SIXGEN

SIXGEN

SIXGEN provides incident response, operational and penetration testing, red teaming, tool development, cyber training development and continuous monitoring.

Opticks Security

Opticks Security

Opticks provides fraud detection and monitoring solutions for leading brands. agencies and networks. Our relentless mission is to deliver reliable and innovative software to beat digital fraud.

42Crunch

42Crunch

42Crunch provides API security testing and threat protection. We proactively test, fix and protect your APIs from development to runtime.

Fairly AI

Fairly AI

Fairly AI is on a mission to democratize safe, secure, and compliant AI across the enterprise.

Orca Fraud

Orca Fraud

Orca is an AI-driven fraud orchestration platform. We empower fraud fighters to outpace fraud using our custom ML models.

Heritage Cyber World

Heritage Cyber World

Heritage Cyber World is a one stop solution for all your security needs that brings together a team of security experts and analysts to deliver high-class security services.

Actfore

Actfore

Actfore offers advanced AI/ML-powered data mining solutions to swiftly detect and uncover sensitive information compromised in cyber breaches.