NEWS > Cybersecurity News


« Back to News

2018-09-21

UK Gets Offensive: New Task Force To Deal With Russia & Terrorists

Britain will step up its counter offensive against threats from Russia and terrorist groups with a joint task force between the MoD and GCHQ.

2018-09-21

Spyware Proliferates To 45 Countries

Pegasus spyware, which targets iPhones and Android devices, has infiltrated numerous countries where its is used to abuse human rights.

2018-09-21

Has Demand For Cyber Security Skills Hit Crisis Point?

The UK Parliament's Joint Committee on the National Security Strategy has published a report that exposes the UK's chronic lack of digital skills.

2018-09-21

Millions Of WiFi Routers Are At Risk Of Hacking

Millions of WiFi networks are vulnerable due to weaknesses in how saved passwords in web browsers interact over unencrypted connections.

2018-09-20

UK Fallout From The Massive Breach At Equifax

The ICO has issued Equifax’ UK subsidiary with the maximum fine of £500,000 for failing to protect personal information of 15m UK citizens.

2018-09-20

The Human Factor Is Essential To Eliminating Bias in Artificial Intelligence

It is not enough to open the ‘black box’ of machine learning. Direct human evaluation is the only way to ensure biases are not perpetuated through AI.

2018-09-20

Keeping Young People Off The Dark Web

UK police are looking for cybersecurity firms to help implement a strategy of steering youngsters away from a life in online crime.

2018-09-19

Iran Targets Kurds With Spyware

Malware collects the target's mobile data including contact lists, phone call records, SMS messages, geo-location, photos, voice messages and more.

2018-09-19

Snowden Demands A Penalty For Misuse Of Aadhaar Data

The Indian government Aadhaar program offers a unique personal ID that can be obtained by residents, using their biometric & demographic data.

2018-09-18

The BA Hack And How Not To Respond To A Cyber Attack

There have been poor responses to cyber attacks on major companies before, but the airline’s actions could be one of weakest in recent history.

2018-09-20

Edward Snowden Reconsidered

Five years since Edward Snowden’s revelations of mass surveillance and his subsequent flight to Moscow, here is a lengthy reflection on his actions.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

International Security Management Association (ISMA)

International Security Management Association (ISMA)

ISMA is an international security association of senior security executives from major business organizations located worldwide.

Snow Software

Snow Software

Snow Software is changing the way organizations think about their technology investments, empowering IT and business leaders to drive transformation with precision and agility.

Cambridge Intelligence

Cambridge Intelligence

Cambridge Intelligence are experts in network visualization and finding hidden trends in complex connected data. Applications include cybersecurity.

Virsec Systems

Virsec Systems

Virsec detects and remediates previously “indefensible” advanced memory-based attacks on critical applications and server endpoints.

Volatility Foundation

Volatility Foundation

Volatility is an open source memory forensics framework for incident response and malware analysis.

EMnify

EMnify

EMnify is a Software-as-a-Service (SaaS) company, revolutionizing cellular Internet of Things (IoT).

Improsec

Improsec

Improsec is a fully independent Cyber Security advisory company - we provide knowledge, experience and both strategic and deep technical expertise to our clients.

Base Cyber Security

Base Cyber Security

Base Cyber Security is an information and cyber security talent service provider and career specialist.

Blackwall

Blackwall

Blackwall (formerly BotGuard) is a security infrastructure company focused on protecting web ecosystems from automated threats, while optimizing performance for hosting environments.

Kindus

Kindus

Kindus is an IT security, assurance and cyber security risk management consultancy.

Infinidat

Infinidat

Infinidat delivers enterprise-proven solutions for data storage, data protection, business continuity, and sovereign cloud storage.

Wavex Technology

Wavex Technology

Wavex Technology is an award winning IT Services firm offering clients a secure and fully managed IT service.

Presidio Identity

Presidio Identity

Presidio Identity offers a digital-native approach that brings security, privacy, and simplicity to user authentication and digital interactions.

Skyhawk Security

Skyhawk Security

Skyhawk Security is the originator of Cloud threat Detection and Response (CDR), helping hundreds of users map and remediate sophisticated threats to cloud infrastructure in minutes.

coc00n

coc00n

coc00n secures the devices of high-value and high-interest individuals against cyber attacks.

Cypfer

Cypfer

CYPFER is a global market leader in ransomware post-breach remediation and cyber-attack first response.