NEWS > Cybersecurity News


« Back to News

2018-11-20

AI For Cyber - You Don’t Need To Know The Threat, Just The Network

AI driven cybersecurity does its work not by hunting viruses but by understanding networks.

2018-11-19

Delay, Deny and Deflect: How Facebook’s Leaders Fought Through Crisis

A bombshell report on Facebook management’s struggles to deal with data breaches, failures to protect privacy and electoral interference.

2018-11-19

Japanese Cybersecurity Minister Does Not Use Computers

The Japanese Government minister in charge of major changes to a key cybersecurity law has admitted he rarely uses a computer.

2018-11-19

AI Is Revolutionising Digital Marketing

With the ability to collect data, analyse it, apply it and then learn from it. ArtificiaI Intelligence is transforming digital strategy for business.

2018-11-22

What Is The GRU & Who Does It Hack?

The GRU is Russia’s Main Intelligence Directorate and officially it doesn’t exist, but its agents are very busy. Who are they and what do they do?

2018-11-16

The Search To Find Cyber Security Experts Of The Future

An online programme designed to inspire teenagers in the UK to think about a career in cyber security will continue for a second year.

2018-11-16

GDPR Alert As Average ICO Fines Double In A Year

The value of fines issued by the British Information Commissioner’s Office (ICO) has increased 24% in the past year.

2018-11-16

China Exports Cyber Surveillance To Africa

China is ramping up exports of facial recognition technology and online surveillance techniques abroad, especially in Africa.

2018-11-19

Russian Internet Research Agency Has A New Propaganda Campaign

The Russian troll farm known as the Internet Research Agency has apparently been boasting of its exploits during the US midterm elections.

2018-11-20

How Companies Can Minimise Cyber Attack Damage

Cyber criminals can often exploit security breaches over months and sometimes even years and that can be very damaging to any organisation.

2018-11-16

Don't Underestimate The Impact Of Phishing

Most companies lack adequate safeguards against phishing threats and its not just about emails.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DomainTools

DomainTools

DomainTools is the global leader for internet intelligence and the first place security practitioners go when they need to know.

CSI

CSI

CSI is a Managed Service Provider (MSP) delivering Hybrid Multi-Cloud, Data Protection, and Cyber Security solutions to highly regulated industries.

Mitek Systems

Mitek Systems

Mitek's global mobile capture and identity verification technology optimizes the digital user experience for thousands of financial services organizations.

Cyber Security Austria (CSA)

Cyber Security Austria (CSA)

Cyber Security Austria (CSA) is an independent non-profit association with the aim to address security issues in the area of IT/cyber security of critical/strategic infrastructures in Austria.

LEPL Cyber ​​Security Bureau - Georgia

LEPL Cyber ​​Security Bureau - Georgia

The aim of the LEPL Cyber Security Bureau is to create and strengthen stable, efficient and secure systems of information and communications technologies.

Cybertonica

Cybertonica

Cybertonica is a FinTech company which detects and prevents fraudulent transactions and reduces risk for financial services organisations.

Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

SWEDAC is the national accreditation body for Sweden. The directory of members provides details of organisations offering certification services for ISO 27001.

DataTribe

DataTribe

DataTribe is a cyber startup foundry, leveraging deep experience and expertise to build and launch successful product companies.

PNGCERT

PNGCERT

PNGCERT is the national Computer Emergency Response Team (CERT) for Papua New Guinea.

Drata

Drata

Drata is a security and compliance automation platform that continuously monitors and collects evidence of a company's security controls, while streamlining workflows to ensure audit-readiness.

Tetra Defense

Tetra Defense

Tetra Defense is a leading incident response, cyber risk management and digital forensics firm.

Cynalytica

Cynalytica

Cynalytica deliver pioneering cybersecurity and machine analytics technologies that help protect critical infrastructure, securely enable Industry 4.0 and help accelerate digital transformation.

Tenet3

Tenet3

Tenet3's vision is to make optimal cyber strategy development tractable, data driven, with concrete success metrics. The result is cost effective cyber resilience for our customers.

IONIX

IONIX

IONIX (formerly Cyberpion) is the attack surface management solution that uses Connective Intelligence to shine a spotlight on exploitable risks across your supply chain.

DataProof Communications

DataProof Communications

DataProof Communications is Cybersecurity Company specialising in cybersecurity operations, incident management and response best practices and technologies.

Capzul

Capzul

Capzul are transforming the network security landscape with a new approach; creating virtually impenetrable networks, precluding cybercriminal attacks on your network ecosystem.