NEWS > Cybersecurity News


« Back to News

2018-07-19

Cybercrime Is A Real Economic Threat

Online scams and cybercrime have the potential to impose irreversible financial, legal and reputational costs. At least take basic precautions.

2018-07-18

Weaponising Stolen Data

A new frontier in cyber threats could be the illicit use of critical infrastructure to manipulate data to weaponise it in new and unexpected ways.

2018-07-18

The White House’s AI Committee's First Meeting

The high level group is charged with establishing partnerships between government, the private sector and independent researchers.

2018-07-18

A New Heavyweight Drone

The Sukhoi Aircraft Company is building a new multi-purpose heavy drone as a technology demonstrator to test new applications.

2018-07-17

Putin Says Russia The Target Of 25m World Cup Cyber Attacks

Putin: "Almost 25m cyber attacks and other criminal acts on the information structures in Russia, linked...to the World Cup, were neutralised"

2018-07-17

Don't Leave AI Governance To The Machines

Now AI has the ability to reach its own conclusions, governance over the machines is critical for both business executives & customers.

2018-07-17

For Sale: Access To Airport Security

Cybercriminals are offering stolen access to airport security systems including transit, surveillance & building automation systems for only $10.

2018-07-16

The Mueller Investigation Identifies Russian Spies

US Intelligence agencies stand vindicated as Special Prosecutor Mueller indicts agents of the Russian military for 2016 electoral interference.

2018-07-16

US Dark Web Raids Lead to Arrests And Seizures

Guns, drugs, cars, gold bars, crytocurrency and crypto-mining gear all seized as US Homeland Security agents arrest 35+ DarkWeb vendors.

2018-07-16

What Does The EU Cybersecurity Vote Mean To You?

EU lawmakers have voted in favour of giving more power and money to the European Network and Information Security Agency (ENISA).

2018-07-16

Is Cyber The Perfect Weapon?

Millions of intrusions into other countries’ networks occur each year, but only a half-dozen or so have done actual significant physical harm.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

softScheck

softScheck

softScheck is an IT security consultancy. Services range from pentesting and compliance testing to security auditing of software and IT infrastructure.

Zentera Systems

Zentera Systems

Zentera's CoIP (Cloud over IP) solution offers enterprise-grade networking and security for the emerging cloud ecosystem.

Nexcom International

Nexcom International

Nexcom operates six global businesses - IoT Automation, Intelligent Digital Security, Internet of Things, Intelligent Platform & Services, Mobile Computing Solutions, Network & Communications.

Procilon Group

Procilon Group

Procilon Group specialize in the development of cryptographic software as well as strategic advice on information security and data protection.

Lirex

Lirex

Lirex offer consulting and outsourcing services, complete design, construction and maintenance of ICT solutions and systems including cybersecurity.

Ravelin Technology

Ravelin Technology

Ravelin prevents chargebacks, fraud, and account takeover. Machine learning and human insight combine for highly accurate fraud detection and prevention.

Cequence Security

Cequence Security

Cequence, a pioneer in API security and bot management, is the only solution that delivers Unified API Protection (UAP), uniting discovery, compliance, and protection.

IberLayer

IberLayer

IberLayer is the company behind the Email Guardian service, a cloud based Email Total Protection system that filters and blocks email threats.

Charterhouse Voice & Data

Charterhouse Voice & Data

Charterhouse is your trusted technology partner - designing, provisioning and supporting the technology that underpins your operations including network security and data compliance.

F1 Security

F1 Security

F1 Security provides a family of web security solutions including web application firewalls, web shell detection solutions, and web shell scanners.

European Union Agency for Network and Information Security (ENISA)

European Union Agency for Network and Information Security (ENISA)

The European Union Agency for Cybersecurity, ENISA, is the Union’s agency dedicated to achieving a high common level of cybersecurity across Europe.

Europol - European Cybercrime Centre (EC3)

Europol - European Cybercrime Centre (EC3)

The European Cybercrime Centre (EC3) was set up by Europol to strengthen the law enforcement response to cybercrime in the EU.

Fulcrum Technology Solutions

Fulcrum Technology Solutions

The Fulcrum team of technologists are recognized experts in the fields of IT Infrastructure Technology, Security, Service Management and Support.

FusionAuth

FusionAuth

FusionAuth is the customer authentication and authorization platform that makes developers' lives awesome.

Corgea

Corgea

Corgea is AI-powered security platform that finds, triages and fixes your insecure code.

Xiphera

Xiphera

Xiphera designs and implements proven cryptographic security for embedded systems.