NEWS > Cybersecurity News


« Back to News

2018-10-22

Guide To All Things Criminal On The Web

An overview of the common kinds of cybercrime, with real-world examples and suggestions for tools you can use to protect yourself.

2018-10-18

Mobile Security Threats Put Businesses At Risk

A significant lack of visibility into non-corporate devices and networks is putting businesses at risk of data leakage and phishing attacks.

2018-10-17

Cyberwars Heat Up In AsiaPac To Battle Chinese Aggression

Governments in the Asia-Pacific region are strengthening their offensive capabilities in the fight against Chinese cyberwarfare.

2018-10-22

Algorithmic Warfare Is Coming. Humans Must Retain Control

Humanity is faced with a grave new reality – the rise of autonomous weapons, where wars are fought with algorithms. By Peter Maurer.

2018-10-22

Routers With Weak Passwords Will Soon Be Illegal In California

A new California law would make it illegal to sell Internet-connected devices that aren’t equipped with a unique password.

2018-10-17

Build A Young Cyber Security Team

Tapping into upcoming talent is the key to Melanie Oldham’s approach to building a cyber security workforce.

2018-10-18

Lesser Skilled Cybercriminals Adopt Nation-State Hacking Methods

New analysis by CrowdStrike reveals a continued blurring of lines between covert methods employed by criminals and known nation-state actors.

2018-10-18

Corporate Cybercrime - A Hacker’s Point Of View

It only takes one cleverly worded email for hackers to attack your system from the inside out. Who are they and what do they stand to gain?

2018-10-15

Blockchain As A Service Market To Reach $7 Billion

A recent analysis by Bank of America suggests that blockchain adoption will soon become a multi-billions dollar business.

2018-10-15

AI Hyperdrives Into Outer Space

Future deep space missions are likely to be turbo-charged by Artificial Intelligence on their voyage to comets, moons and the planets.

2018-10-17

Artificial Intelligence - What We Need To Know

The trouble with the term artificial intelligence is the word 'intelligence'. It should not be confused with human sentience.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Infowhiz solutions

Infowhiz solutions

Infowhiz provides solutions for backup/disaster recovery and network security.

Cybrary

Cybrary

Cybrary is an open-source cyber security and IT learning and certification preparation platform.

GreyCampus

GreyCampus

GreyCampus is a leading provider of training for working professionals in the areas of Project Management, Big Data, Data Science, Service Management, Quality Management and Information Security.

Red River

Red River

Red River is a technology transformation company, bringing 25 years of experience and mission-critical expertise in analytics, cloud, collaboration, mobility, networking and security solutions.

HALOCK Security Labs

HALOCK Security Labs

HALOCK is an information security consultancy providing both strategic and technical security offerings.

Outsource Group

Outsource Group

Outsource Group is an award winning Cyber Security and IT Managed Services group working with a range of SME/Enterprise customers across the UK, Ireland and internationally.

TatvaSoft

TatvaSoft

TatvaSoft is a custom software development company delivering business IT solutions and related services to customers across the globe.

Telstra

Telstra

Telstra is one of the world's leading telecommunications and technology companies, offering a wider range of services from networks and cloud solutions to mobility and enterprise collaboration tools.

Sentra

Sentra

Sentra is focused on improving data security practices within the cloud, mitigating the risks of damaging data leaks by providing comprehensive visibility into critical data assets.

Aceiss

Aceiss

Aceiss empowers access security, providing unprecedented visibility and insights into user access.

Unit 42

Unit 42

Unit 42 brings together world-renowned threat researchers, incident responders and security consultants to create an intelligence-driven, response-ready organization.

V3 Cybersecurity

V3 Cybersecurity

V3 Cybersecurity is a unique company focused on contextualization of security programs from a business perspective. Our mission is to provide enterprise IT Risk Management capabilities.

WireGuard

WireGuard

WireGuard is a communication protocol and free and open-source software that implements encrypted virtual private networks (VPNs).

Sri Lanka CERT

Sri Lanka CERT

Sri Lanka CERT is the National Centre for Cyber Security, which has the national responsibility of protecting the nation’s cyberspace from cyber threats.

Uptime Institute

Uptime Institute

Uptime Institute is an unbiased advisory organization focused on improving the performance, efficiency, and reliability of business critical infrastructure.

Invisinet Technologies

Invisinet Technologies

Invisinet is a cybersecurity technology company specializing in innovative solutions that protect network infrastructure and critical assets from advanced threats.