NEWS > Cybersecurity News


« Back to News

2018-10-22

Algorithmic Warfare Is Coming. Humans Must Retain Control

Humanity is faced with a grave new reality – the rise of autonomous weapons, where wars are fought with algorithms. By Peter Maurer.

2018-10-22

Routers With Weak Passwords Will Soon Be Illegal In California

A new California law would make it illegal to sell Internet-connected devices that aren’t equipped with a unique password.

2018-10-17

Build A Young Cyber Security Team

Tapping into upcoming talent is the key to Melanie Oldham’s approach to building a cyber security workforce.

2018-10-18

Lesser Skilled Cybercriminals Adopt Nation-State Hacking Methods

New analysis by CrowdStrike reveals a continued blurring of lines between covert methods employed by criminals and known nation-state actors.

2018-10-18

Corporate Cybercrime - A Hacker’s Point Of View

It only takes one cleverly worded email for hackers to attack your system from the inside out. Who are they and what do they stand to gain?

2018-10-15

Blockchain As A Service Market To Reach $7 Billion

A recent analysis by Bank of America suggests that blockchain adoption will soon become a multi-billions dollar business.

2018-10-15

AI Hyperdrives Into Outer Space

Future deep space missions are likely to be turbo-charged by Artificial Intelligence on their voyage to comets, moons and the planets.

2018-10-17

Artificial Intelligence - What We Need To Know

The trouble with the term artificial intelligence is the word 'intelligence'. It should not be confused with human sentience.

2018-10-16

US And France To Permit Fully Driverless Cars On Public Roads

The USA and France are developing safety standards and regulations to allow fully driverless vehicles on public roads.

2018-10-16

Stop US School Shootings With AI

A new artificial intelligence security system is aiming to give parents and their kids some additional peace of mind.

2018-10-16

New Google App Fights Censorship

A new Google app has recently been launched aimed at protecting users from state-sponsored censorship.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Packet Storm

Packet Storm

Packet Storm is an online resource for security tools, whitepapers, exploits, and advisories on computer security issues.

Sintef Digital

Sintef Digital

Sintef Digital carries out research in Information and Communication Technology for industry and the public sector.

Decision Group

Decision Group

Decision Group are a Total Solution Supplier offering Network Forensics and Lawful Interception tools.

Resolver

Resolver

Resolver’s Integrated Risk Management platform helps plan and prepare your organization to limit the likeliness or impact of security risk and compliance events from occurring.

California Cybersecurity Institute (CCI) - Cal poly

California Cybersecurity Institute (CCI) - Cal poly

The CCI provides a hands-on research and learning environment to explore new cyber technologies and train and test tactics alongside law enforcement and cyberforensics experts.

FFRI Security

FFRI Security

FFRI is committed to research and development of preventing the most advanced cyber-attacks and breaches.

FileWave

FileWave

FileWave offers a single solution for managing apps, devices, and more for Mac, Windows, and mobile devices.

Gospel Technology

Gospel Technology

Gospel presents a totally new way of accessing and controlling data which is enterprise grade scalable, highly resilient, and secure.

Cytomic

Cytomic

Cytomic is the business unit of Panda Security specialized in providing advanced cybersecurity solutions and services to large enterprises.

IFE Digital Systems

IFE Digital Systems

IFE Digital Systems conducts research, development and consultancy in risk, safety and security related to digital systems in critical infrastructure.

S4x Events

S4x Events

S4x are the most advanced and largest ICS cyber security events in the world.

OffSec

OffSec

OffSec have defined the standard of excellence in penetration testing training. Elite security instructors teach our intense training scenarios and exceptional course material.

HORNE

HORNE

HORNE is a professional services firm supporting clients in public, private & government sectors nationwide.

Rootshell Security

Rootshell Security

Rootshell Security is transforming vulnerability management with its vendor-agnostic Prism Platform and industry-leading offensive security assessments.

Xoriant

Xoriant

Xoriant is a technology leader and execution partner throughout the Build, Run and Transform lifecycle for companies that create and use technology products.

Tamnoon

Tamnoon

Tamnoon is the Managed Cloud Detection and Response platform that helps you turn CNAPP and CSPM alerts into action and fortify your cloud security posture.