NEWS > Cybersecurity News


« Back to News

2018-07-03

Inside The Chinese-Hacking Underground

The experts at Flashpoint know how to identify & characterise the exploits of Chinese hacking groups distinct from those of other nations.

2018-07-03

Trump Backs Russia On Election Interference

President Trump contradicts the US intelligence establishment's conclusions about Russian interference in the 2016 Presidential elections.

2018-07-02

Google AI To Predict Patient Healthcare Outcomes

Google has a tool that could forecast patient outcomes, how long they may stay in hospitals, odds of re-admission and chances they will die.

2018-07-02

Israel Gets 20% Of Global Cybersecurity Investment

Prime Minister Netanyahu claims that surging investment in the emergent Israeli cybersecurity industry has tangible benefits for national defence.

2018-07-02

By 2020 US Immigration Will Be Digitised

Can an alliance of US Army lawyers, language processing technology and facial recognition fix the US immigration crisis? It seems unlikely.

2018-07-10

So Much Hot Air About Virtual Currencies

Rhetoric on virtual currencies has centred on risks and threats. But the technology also has the potential to promote financial inclusion.

2018-07-02

Get Started with Predictive Analytics

Many businesses don't fully understand the holistic view predictive analytics can bring to their organisation. They need to try harder.

2018-07-02

What War Games Tell Us About The Use Of Cyber Weapons

The US defence establishment have been gaming cyber warfare to find out if cyber weapons are equally as destructive as conventional weapons.

2018-06-29

Cyber Attackers Tunnel Into Financial Services Firms

Global financial services organisations are targeted by sophisticated cyber attackers to steal critical data and personally-identifiable information.

2018-06-29

Cybersecurity Issues For Open Banking

Only a standardised, industry-wide format will give the security and assure the level of trust crucial to the success of the Open Banking initiative.

2018-06-28

Effective Data Security Is A Team Effort

Delivering effective data security in today’s business environment can be challenging. To achieve it takes teamwork and communication.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Rubicon Workflow Solutions

Rubicon Workflow Solutions

Rubicon is a leading provider of managed IT support and strategic services, specialising in creative and mixed platform environments.

Cryptus Cyber Security

Cryptus Cyber Security

Cryptus Cyber Security is an Information Security Training company providing advanced training and services to IT Professionals.

Green Hills Software

Green Hills Software

Green Hills Software is the largest independent vendor of embedded secure software solutions for applications including the Internet of Things.

Idemia

Idemia

Idemia is a global leader in security and identity solutions.

Blue Ridge Networks

Blue Ridge Networks

Blue Ridge offers a suite of solutions that enable secure remote access to the enterprise network with protection and control of endpoints.

FFRI Security

FFRI Security

FFRI is committed to research and development of preventing the most advanced cyber-attacks and breaches.

Monster Jobs

Monster Jobs

Monster is a global leader in connecting people to jobs, wherever they are. Monster covers all job sectors including cybersecurity in locations around the world.

Virtue Security

Virtue Security

Virtue Security are specialists in web application penetration testing.

Nineteen Group

Nineteen Group

Nineteen Group delivers major-scale exhibitions within the security, fire, emergency services, health and safety, facilities management and maintenance engineering sectors.

RNTrust

RNTrust

RNTrust provide solutions to meet today’s digital challenges utilizing digital technologies and services to make you more secured in digitally connected environment.

Sekuro

Sekuro

Sekuro is your leading governance and cyber security partner. Building organisational resilience. Enabling fearless innovation.

Navisite

Navisite

Navisite is a combination of eight respected IT consulting and managed service providers that were brought together under the Navisite brand.

Cyral

Cyral

Easily observe, control, and protect your data endpoints in a cloud and DevOps-first world. Discover Data Mesh Security with Cyral.

BalkanID

BalkanID

BalkanID is an Identity governance solution that leverages data science to provide visibility into your SaaS & public cloud entitlement sprawl.

Tychon

Tychon

Tychon develops advanced enterprise endpoint management technology that enables commercial and government organizations to bridge the gap between security and IT operations.

Backslash Security

Backslash Security

With Backslash, AppSec teams gain visibility into critical risks in their apps based on reachability and exploitability.