NEWS > Cybersecurity News


« Back to News

2018-03-27

LinkedIn Updates Policies For GDPR

LinkedIn is making changes that will impact the user agreement, privacy policy, cookie policy and professional community policies in time for GDPR.

2018-03-26

Equifax: Insider Trading Charges

An Equifax executive faces charges of insider trading based upon confidential information about a data breach affecting data of 140 million people.

2018-03-26

Petty Criminals Have Use Of Sophisticated Hacking Tools

The experts at Cyberint say that hackers have started using sophisticated hacking tools and techniques once used only by nation states.

2018-03-26

UK Police Helping Business Fight Cyber Attacks

London's Metropolitan Police offer an innovative new exercise that teaches business leaders how to protect their companies from cyber-attacks.

2018-03-26

The Resurgent Cyber Threat From Iran

Iran's army of hackers are emboldened and skilled at carrying out surveillance operations and sophisticated attacks beyond its borders.

2018-03-23

Russia Can Disconnect From The Internet

Russia has prepared the infrastructure to support a digitally isolated state, capable of operating independently from the World Wide Web.

2018-03-23

Crypto Mining Malware Hits Business

Crypto-mining malware continues to impact organisations globally as 23% were affected by the Coinhive variant during January, say Check Point.

2018-03-22

Slingshot: Avoiding Sophisticated Cyber Espionage

Kaspersky has discovered a highly sophisticated cyber espionage campaign that spreads through compromised routers and can remain undetected.

2018-03-21

Cambridge Analytica Claim To Sway Elections With Facebook Data

If Cambridge Analytica can sway elections using a relatively small subset of Facebook’s data, what can Facebook do with the full set?

2018-03-23

About Strategic Threat Intelligence

Threat Intelligence informs you about potential malicious activity and helps you make better decisions about prevention of damaging attacks.

2018-03-22

Cybercrime Costs Londoners £26m Every Month

Scotland Yard say Londoners are losing an average of £26 million a month in cyber attacks on the capital's businesses and citizens.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Quality Professionals (Q-Pros)

Quality Professionals (Q-Pros)

QPros are a recognized leader in providing full-cycle software quality assurance and application testing services.

New Zealand Internet Task Force (NZITF)

New Zealand Internet Task Force (NZITF)

The New Zealand Internet Task Force (NZITF) is a non-profit with the mission of improving the cyber security posture of New Zealand.

Philippine National Police Anti-Cybercrime Group (PNP-ACG)

Philippine National Police Anti-Cybercrime Group (PNP-ACG)

The mission of the PNP Anti-Cybercrime Group is to implement and enforce pertinent laws on cybercrime and other cyber related crimes and pursue an effective anti-cybercrime campaign.

M2SYS

M2SYS

M2SYS is a worldwide leader in identification and authentication solutions.

Drootoo

Drootoo

Drootoo is transforming businesses and making them high performing entities with its unified cloud platform.

Cyber Command - Estonian Defence Forces

Cyber Command - Estonian Defence Forces

The main mission of the Cyber Command is to carry out operations in cyberspace in order to provide command support for Ministry of Defence’s area of responsibility.

Digital Fingerprints

Digital Fingerprints

Digital Fingerprints provides continuous authentication with behavioural biometrics. Protection against account takeover and session takeover. Compliant with GDPR and PSD2.

Quad9 Foundation

Quad9 Foundation

Quad9 is a free security solution that uses DNS to protect your system against the most common cyber threats. It improves your system's performance, plus, it preserves and protects your privacy.

Catalogic Software

Catalogic Software

Catalogic helps clients backup, recover, manage, and protect their data across their enterprise and cloud environments with Smart Data Protection solutions.

Netox

Netox

Netox is a comprehensive IT service provider that combines IT support services, IT solutions and specialist services; specializing in cybersecurity solutions.

Hetz Ventures

Hetz Ventures

Hetz Ventures is a global-facing VC investing in highly talented and ambitious Israeli founders who operate at the cutting edge of deep technology.

Leostream

Leostream

Leostream's Remote Desktop Access Platform enables seamless work-from-anywhere flexibility while maintaining security and constant visibility of users.

Lakera

Lakera

Lakera empowers developers and organizations to build GenAI applications without worrying about AI security risks.

Saidot

Saidot

Saidot is a Finnish AI governance and alignment company committed to helping businesses safely and transparently integrate AI into their operations.

ISGroup S.r.l

ISGroup S.r.l

ISGroup is your trusted partner for Network Penetration Testing, operating under internationally recognized standards and a strong focus on research.

iValue Group

iValue Group

iValue specialize in securing and managing enterprises' digital applications and data for hybrid-cloud environments.