NEWS > Cybersecurity News


« Back to News

2018-08-23

Digital Resilience Is A Step Up From Cybersecurity

Business resilience means an organisation is able to adopt new systems and processes, ensuring continued competitiveness and business survival.

2018-09-02

Alaska Dusts Off Its Typewriters

Government workers in a borough of Alaska have turned to typewriters to do their jobs, after ransomware infected their computer systems.

2018-08-08

Dixons Carphone Data Breach Hits 10m Users

A data breach at electronics retailer Dixons Carphone is almost ten times larger than the company first thought.

2018-08-31

Surveillance Cameras That Spot Your Personality Type

AI can be used to analyse biometric data, like subtle on-camera eye movement, to predict personality traits better than random guessing.

2018-08-31

What Are Deepfakes?

The Internet now mediates every aspect of our lives, and an inability to trust anything we see could lead to an "end of truth."

2018-08-23

Phone Calls, Texts Or Email - How Do Millennials Communicate?

The fundamentals of good communication don’t change between generations, but personal voice communications are slipping down the priority list.

2018-08-16

Balancing Security With Digital Transformation

How do companies keep up with the pace of technical innovation & competition while protecting their critical assets from security breaches?

2018-08-30

AI Driven Security Is Much More Than An Algorithm

Good data boosts AI's ability to make judgments, and this starts with baseline data about users, devices, network systems and workflow patterns.

2018-08-30

GDPR Means Revisiting Email Marketing

Business can no longer approach email marketing strategies casually. Under GDPR, you are required to be able to prove every user chose to sign up.

2018-08-30

Satellite Imagery + Social Media = A New Way To Spot Emerging Nuclear Threats

Hiding illicit nuclear programs might be getting harder, thanks to new ways of gleaning and combining clues from different rivers of digital data.

2018-08-07

Criminals Are Driving Australian Data Breaches

Criminal attacks accounted for the majority of data breaches reported to the Office of the Australian Information Commissioner in Q2 2018.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

rPeople Staffing

rPeople Staffing

rPeople provides direct placement in all areas of your organization, including and specializing in Technical and Executive hiring.

Pyramid Computer

Pyramid Computer

Pyramid Computer provides custom enterprise solutions for Industrial PC, Imaging, Network, Security, POS, Indoor Positioning and Automation.

Homeland Security Investigations (HSI)

Homeland Security Investigations (HSI)

Homeland Security Investigations (HSI) is a premier federal law enforcement agency within the Department of Homeland Security (DHS).

SK-CERT

SK-CERT

SK-CERT National Computer Computer Emergency Response Team of Slovakia.

CyberCrowd

CyberCrowd

CyberCrowd is a cyber security specialist offering technical services, cyber security assessments, guidance and security thought leadership.

Arete

Arete

Arete is a global cyber risk company whose mission is to transform the way organizations prepare for, respond to, and prevent cybercrime.

SANS CyberStart

SANS CyberStart

SANS CyberStart is a unique and innovative suite of tools and games designed to introduce children and young adults to the field of cyber security.

Hardenite

Hardenite

Hardenite solution helps R&D, DevOps and IT teams to continuously manage security risks and hardening efforts of any Linux OS – based product, throughout the product life cycle.

Privafy

Privafy

Privafy helps mobile service providers, IoT manufactures , and enterprises redefine the way they protect Data-in-Motion.

Tracepoint

Tracepoint

Tracepoint provide full-service cyber incident response, remediation and recovery solutions for the most time-sensitive situation your company may ever face.

Securolytics

Securolytics

Securolytics offers the simplest, most complete and affordable IoT security for all organizations. Securolytics quickly identifies unmanaged devices to reduce security and compliance risks.

SE Ventures

SE Ventures

SE Ventures provides capital to big ideas and bold entrepreneurs who can benefit from Schneider Electric's deep domain expertise, R&D assets, and global customer base.

Bit Sentinel

Bit Sentinel

Bit Sentinel is an information security company. We help companies like yours discover, prioritize, and effectively remediate potential cybersecurity risks.

Cloud & More

Cloud & More

Tired of impersonal IT support? Experience the Cloud & More difference. We offer tailored IT services with a personal touch, ensuring your business technology runs smoothly.

Teal

Teal

Teal provides exceptional managed IT solutions for small- to medium-sized organizations that value real partnerships and elevated security.

Harmonia Holdings Group

Harmonia Holdings Group

Harmonia Holdings Group was born in 2006 with the vision to bring innovation and change to the federal IT sector.