NEWS > Cybersecurity News


« Back to News

2018-04-16

The Pentagon Is Busy Integrating Cyber Into Its Battle Plans

US Cyber Command is emerging as a unified combat command, integrating cyber planning and effects into traditional military operations.

2018-04-13

Cyber Criminals Have Ingenious Money Laundering Methods

Cyber criminals are using a combination of cryptocurrencies, gaming currencies and micro-payments to launder $200bn of stolen money.

2018-04-13

How to Improve Cyber Security Awareness In Your Organisation

CIOs can help combat the ever-evolving threats occurring in the workplace by highlighting security issues and raising overall awareness.

2018-04-13

UK Police Cybercrime Training

British police have spent a measly £1.3m on cybercrime training for officers in the last three years, yet cyber skills are vital for modern policing.

2018-03-29

US Imposes Cyber Sanctions On Iran

Iran is protesting about US sanctions imposed on 10 citizens and a tech firm accused of cyber attacks on at least 320 universities worldwide.

2018-04-12

Police Stab Vest Detects Injury

Wearable technologies containing sensors can save lives. A smart police vest can detect an injury automatically and send an alert for help.

2018-04-12

AI Won’t Replace The Human Brain

Startup Nectome thinks it is possible to create a map of all of the brain's neuron connections, a "connectome", to make an artificial reconstruction.

2018-04-12

How to Access the Dark Web Anonymously

Are you trying to find out how to access the dark web? You will need an anoymising browser, but its unreliable, slow and you might not like it.

2018-04-11

Cambridge Analytica, Facebook & GDPR

The UK Information Commissioner has her work cut out deciding if there has been any illegality in her jurisdiction. Would it be different after GDPR?

2018-04-11

Criminal Web-Injects Can Steal Cryptocurrency

Criminals are deploying a variety of tactics to try and profit from the cryptocurrency boom, including web-injects to intercept & modify web traffic.

2018-04-11

The Cloud Is A Key To Cyber Defence

Organisations need to grasp security intelligence and act on it faster to get ahead of attackers. Cloud-based security can make that possible.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Charlton Networks

Charlton Networks

Charlton Networks provide a complete range of IT infrastructure, network and security solutions aimed at SME companies.

FAMOC

FAMOC

FAMOC is an enterprise mobile management solution that delivers comprehensive security and management for applications, documents, email, and mobile devices.

InteliSecure

InteliSecure

InteliSecure offer Professional Services, Security Assessments and Managed Services for data and threat protection.

BGD E-GOV CIRT

BGD E-GOV CIRT

BGD e-GOV CIRT's mission is to support government efforts to develop ICT programs by establishing incident management capabilities within Bangladesh.

Redshift Consulting

Redshift Consulting

Redshift is an information management and information security consulting company offering a full range of services from infrastructure design to security assessments and network monitoring.

Trustelem

Trustelem

Trustelem offers European and global companies a ready-to-use access management service that respects the principles of sovereignty, territoriality and privacy.

AiCULUS

AiCULUS

AiCULUS is a global technology company that specializes in API security and Risk Management products.

IT Acceleration

IT Acceleration

IT Acceleration is a full-service IT management and support, IT compliance and Digital Forensics company.

Outseer

Outseer

Outseer is a leading technology company in the fight against payments fraud. Outseer reliably determines authentic customers from fraudulent behavior.

IT-Seal

IT-Seal

IT-Seal GmbH specializes in sustainable security culture and awareness training.

Pathlock

Pathlock

Pathlock (formerly Greenlight) help enterprises and organizations automate the enforcement of any process, access, or IT general control, for any business application.

PROW Information Technology

PROW Information Technology

PROW is at the forefront of the technology and digital revolution with a focus and mastery in the cybersecurity, information security and data management realms.

HEROIC Cybersecurity

HEROIC Cybersecurity

HEROIC’s enterprise cybersecurity services help improve overall organizational security with industry best practices and advanced technology solutions.

Darkstrike / Qeros

Darkstrike / Qeros

Complete your defense in-depth strategy with Darkstrike, the world’s most advanced quantum-secure and ransomware-proof data platform for any use case, ensuring unconditional data security.

Options Technology

Options Technology

Options is a global leader in financial technology, specialising in Capital Markets technology and enterprise-grade solutions.

Trovent Security

Trovent Security

Trovent was founded with a clear goal: to support medium-sized companies in significantly increasing their IT security level.

Cakewalk

Cakewalk

Cakewalk is the new standard in easy Access Control. Trusted by IT & Security teams. Loved by employees.

Socket

Socket

Socket protects software applications and critical services from malware and security threats originating in open source code.

VPNBlade

VPNBlade

VPNBlade is your go-to resource for expert reviews and advice on VPN services.