NEWS > Cybersecurity News


« Back to News

2018-04-09

IBM’s Watson Takes On The IoT

IBM Watson Assistant is a new artificial intelligence assistant designed to work with autonomous and IoT devices.

2018-04-06

Using GDPR Compliance To Excel At CRM

GDPR offers an unprecedented opportunity for businesses to provide better data security and privacy services to their customers.

2018-04-06

The Cambridge Analytica Case Is A Red Herring

There's nothing Cambridge Analytica could have done that Facebook itself doesn't routinely offer political clients.

2018-04-05

Inside the Big Business Of Cyber Crime

Just as big businesses operate based on regulations, the laws of supply and demand and even customer reviews, so does the black market.

2018-04-04

Snowden Says Social Media Is Surveillance 'Rebranded'

Edward Snowden thinks that social media platforms have deceived their users and are, in fact, the same as surveillance companies.

2018-03-29

DARPA Wants AI To Reveal Adversaries' True Intentions

The US Defense Advanced Research Projects Agency will use AI to understand and detect how adversaries are using deception & covert tactics.

2018-04-04

Healthcare Security Should Use More Sophisticated Tools

IT staff for healthcare providers must regularly update their cybersecurity practices to keep them ahead of emerging security challenges.

2018-04-04

Staying One Step Ahead Of The Cyber Spies

Growth Market: GCHQ estimate that 34 separate nations have serious, well-funded cyber espionage teams targeting friends and foes alike.

2018-03-28

Snowden Says Bitcoin Is Not Private

The NSA whisltleblower turned tech pundit points out that the blockchain public ledger means that anyone can see Bitcoin transactions.

2018-03-28

Google Launches An Initiative To Tackle Fake News

Google will spend $300m to support the media industry through greater filtration of content, fight misinformation & to support accurate journalism.

2018-04-03

The Symphonic Enterprise

How Strategy, Technology, and Operations Work Together: Leading companies can learn to leverage technology broadly across the enterprise.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Chertoff Group

Chertoff Group

The Chertoff Group provide security advice and risk management services covering cyber security, insider threat, physical security and asset protection.

SCADAhacker

SCADAhacker

SCADAhacker provides mission critical information relating to industrial security of SCADA, DCS and other Industrial Control Systems.

CISPA Helmholtz Center for Information Security

CISPA Helmholtz Center for Information Security

The CISPA Helmholtz Center for Information Security is a German national Big Science Institution within the Helmholtz Association. Our research encompasses all aspects of Information Security.

BioCatch

BioCatch

BioCatch uses behavioral biometrics for fraud prevention and detection. Continuous authentication for web and mobile applications to prevent new account fraud.

Sqreen

Sqreen

Sqreen is a web application security monitoring and protection solution helping companies protect their apps and users from attacks.

Achtwerk

Achtwerk

Achtwerk manufacture the security appliance IRMA for critical infrastructures and networked automation in production plants.

Glilot Capital Partners

Glilot Capital Partners

Glilot Capital Partners is an Israeli seed and early-stage VC. We specialize in businesses which disrupt enterprise technology, mainly in the fields of AI, big data and cybersecurity.

NeuShield

NeuShield

NeuShield is the only anti-ransomware technology that can recover your damaged data from malicious software attacks without a backup.

C5 Capital

C5 Capital

C5 Capital is a specialist investment firm that exclusively invests in the secure data ecosystem including cybersecurity, cloud infrastructure, data analytics and space.

Cyber Resilience Centre for Wales (WCRC)

Cyber Resilience Centre for Wales (WCRC)

The Cyber Resilience Centre for Wales (WCRC) is part of the national roll out of Cyber Resilience Centres in the UK which began in 2019.

Spyderbat

Spyderbat

Spyderbat ATI closes the manual investigation gap between detection and response by instantly presenting causally connected threat activity to security analysts at the onset of an investigation.

Myota

Myota

Myota intelligently equips each file to be resilient and achieve Zero Trust-grade protection. Withstand ransomware and data breach attacks. Reduce data restoration time and effort.

Nasuni

Nasuni

The Nasuni File Data Platform offers the protection, detection, and recovery of file shares from ransomware attacks or random disasters within minutes.

Xobee Networks

Xobee Networks

Xobee Networks is a Managed Service Provider of innovative, cost-effective, and cutting-edge technology solutions in California.

Schellman

Schellman

Schellman is a leading provider of attestation and compliance services.

Sword Group

Sword Group

Sword is a leader in data insights, digital transformation and technology services with a substantial reputation in complex IT, business projects and mission critical operations.