NEWS > Cybersecurity News


« Back to News

2018-11-02

Cyber Audits: The Missing Layer in Cybersecurity

Involving the audit team ensures that technology solutions are being properly deployed to address critical strategic security risks.

2018-11-01

Machine Learning & Big Data - Where You Least Expect It

Machine Learning has gone from a cryptic domain understood by a few to a technology that every company must deploy. Likewise Big Data.

2018-10-31

North Korea Is Using The Internet Like The Mafia

North Korea has “dramatically” changed its Internet use patterns, as Kim Jong Un directs hacking operations ‘like a Criminal Syndicate’.

2018-10-31

British Refuse To Co-operate With Belgian Hacking Inquiry

The UK refusal to cooperate with an inquiry into GCHQ’s alleged hacking of Belgacom could damage diplomatic relations with NATO partners.

2018-10-31

Russia And US Offer Competing Visions Of Cyber Normality

The United States is trying to get Russia, China, and others 'on the record' on how international law applies online.

2018-10-30

IBM Spends $34B To Buy Red Hat

Older technology companies like IBM are turning to deal-making to gain scale and fend off competitors in cloud computing.

2018-10-30

Britain To Spend Up To £1B Extra On Cyber Warfare

Britain has decided to spend big on modernising its defence infrastructure, including building expertise in offensive cyber warfare methods.

2018-10-30

The Haunting Horror Story Of Cybercrime

Cybercrime: Darkness falls across the land, the midnight hour is close at hand. Halloween is upon the scene and frightening things are unforeseen.

2018-10-29

Amazon Scraps AI Recruiting Tool That Showed Bias Against Women

Amazon's machine-learning specialists have uncovered a big problem: their new recruiting engine did not like women.

2018-10-30

Arrest Of Intelligence Officer Sparks Fears Of Chinese Hacking Attack

Top figures in the infosec industry fear that the recent arrest of a top Chinese intelligence officer will spark an increase in cyber-attacks.

2018-10-30

Facebook Sued Over Video Viewing Figures

In the dash for business growth Facebook miscounted audiences. Now, advertisers are suing them for unfair business conduct and fraud.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NuHarbor Security

NuHarbor Security

NuHarbor is a leading information security consulting and advisory firm specializing in Information Security, Compliance, and Risk Management.

ESET

ESET

ESET provide security software for enterprises and consumers - Antivirus Software, Internet Security and Virus Protection.

eco

eco

eco, with more than 950 member organizations, is the largest Internet industry association in Europe.

France Cybersecurity

France Cybersecurity

France Cybersecurity represents the French cybersecurity industry to raise international awareness of French cybersecurity capabilities and solutions.

ProPay

ProPay

ProPay provides secure payment solutions for organizations ranging from small businesses to large enterprises requiring complex payment solutions.

NSIDE Attack Logic

NSIDE Attack Logic

NSIDE Attack Logic simulates real-world cyber attacks to detect vulnerabilities in corporate networks and systems.

SMiD Cloud

SMiD Cloud

SMiD encryption technology has been developed following the highest security practices to allow the data availability, integrity and confidentiality.

Uleska

Uleska

Uleska is a scalable platform that provides automated and continuous software security testing whilst translating cyber risk.

SAIFE

SAIFE

SAIFE has adapted a Software Defined Perimeter approach and paired it with a Zero Trust model that defines access by the user, their device, and where they are located.

ZINAD IT

ZINAD IT

ZINAD is an information security company offering state-of-the-art cybersecurity awareness products, solutions and services.

Locuz

Locuz

At Locuz, we’ve made it our mission to help businesses like yours create an actionable digital strategy.

Access Venture Partners

Access Venture Partners

Access Venture Partners are an early stage VC firm investing in bold founders and helping every step of the way. Areas we give special focus to include cybersecurity.

GAM Tech

GAM Tech

GAM Tech is a Managed IT Service Provider that serves small and medium sized businesses in Alberta, British Columbia, Ontario and Quebec.

Potech

Potech

Potech provides masterful services in Information & Technology and Cybersecurity to multiple markets across the world.

Taktika

Taktika

Taktika stands at the forefront of cybersecurity defense, offering cutting-edge integration and managed Security Operations Center (SOC) services.

ThingsRecon

ThingsRecon

ThingsRecon empowers organisations to continuously map and manage their attack surface, uncover hidden vulnerabilities, and assess supplier cyber hygiene.