NEWS > Cybersecurity News


« Back to News

2018-03-13

Philosophy Of The Information Age

Information, misinformation and fake news in the information age prompt some hard philosophical questions, with no clear answers.

2018-03-13

US Spy Chiefs Look For UK Guidance On Cybersecurity

Concerned over the vulnerability of US companies, US security chiefs are considering replicating Britain's unified National Cyber Security Centre.

2018-03-13

Further Cyberattacks On German Government Networks

While blaming Russian APT28 hackers Germany's security services have allowed the attack to continue in order to gather more information.

2018-03-09

NSA’s Global Spy Monitor

Security researchers have spotted scanning tools that the NSA use to detect other nation-state hackers on the machines it infects.

2018-03-06

N Korea Is A Bigger Cyber Threat Than Russia

North Korea poses a more considerable cyber-attack threat to the international community than Russia, say the experts at CrowdStrike.

2018-03-06

Combating The Threat Of Malicious AI

Without a coherent international response, AI technology created to derive deep insights could be misappropriated, with grave consequences.

2018-03-09

Artificial Intelligence Is Cyber Defence

AI can help spot trends, patterns and anomalies in data that the naked eye cannot discern to identify and mitigate proliferating new types of malware.

2018-03-07

Cybercriminals Use Fake Websites

Criminal tricks include websites disguised as crypto-currency exchanges or fake services offering cloud mining. But the users always lose their money.

2018-03-13

Does Fake News Affect Threat Intelligence?

The concept of ‘fake news’ has plagued media for the past couple of years, but what is its impact upon business-level cybersecurity?

2018-03-12

Autonomous Cars Hit The Road In California

Look - No Hands: Tech companies and others working on driverless vehicle systems will begin trialling their cars without a safety driver present.

2018-03-09

Russian Hacker False Flags Work - Even After They're Exposed

False Flag identities for nation-state hackers are just as standard a part of the toolkit as phishing links and infected Microsoft Office attachments.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Ikarus Security Software

Ikarus Security Software

Ikarus focuses on antivirus and content-security solutions.

ThreatSpike Labs

ThreatSpike Labs

ThreatSpike Labs provides the first end-to-end fully managed security service for companies of all sizes.

Ekran System

Ekran System

Ekran System is an advanced insider threat detection solution for companies of any size.

LEADS

LEADS

LEADS is considered as a leading ICT Solution Provider and an IT partner of choice in Bangladesh.

Information and Communication Technology Authority (ICT Authority) - Kenya

Information and Communication Technology Authority (ICT Authority) - Kenya

The ICT Authority is responsible for enforcing ICT standards in Government and ensuring information security.

TeskaLabs

TeskaLabs

TeskaLabs is a software vendor of cybersecurity and data privacy products.

eSec Forte Technologies

eSec Forte Technologies

eSec Forte Technologies is a CMMi Level 3 certified Global Consulting and IT Security Services company.

ZARIOT

ZARIOT

ZARIOT's mission is to restore order to what is becoming connected chaos in IoT by bringing unrivalled security, control and quality of service.

Periculus

Periculus

Periculus makes managing digital risk simple. Its integrated platform offers access to purchase cyber insurance and cyber security solutions uniquely tailored to fit the needs of every business.

Pathway Communications

Pathway Communications

Established in 1995, Pathway Communications – is part of the Pathway Group of Companies, a Canadian IT Managed Services organization.

Airgap Networks

Airgap Networks

Airgap is fixing the fundamental flaw of excessive trust. We help enterprises modernize their network for a simple and secure infrastructure.

Esprinet

Esprinet

The Esprinet Group is an enabler of the technology ecosystem: a team of people who promote access to technology through an extensive network of professional resellers.

Fulcrum IT Partners

Fulcrum IT Partners

Fulcrum IT Partners is the parent company of an expanding portfolio of established IT solution companies around the world with proven expertise in cyber security, cloud, and managed services.

CyAmast

CyAmast

CyAmast is an IoT Network security and analytics company that is changing the way enterprise and governments detect and protect networks from the pervasive threat of cyber attacks.

Beazley Security

Beazley Security

Beazley Security is a global cyber security firm committed to helping clients develop true cyber resilience: the ability to withstand and recover from any cyberattack.

Koop

Koop

Koop’s trust management platform helps navigate the complexities of regulatory compliance, security reviews, and liability insurance in a single place.