NEWS > Cybersecurity News


« Back to News

2018-02-07

Drones: A Crowd-Management Solution

India is working on crowd-management solutions in public places using drones for both crowd management and infrastructure inspection.

2018-01-30

In S.Africa The Cybersecurity Skills Gap Is A Chasm

South Africa has seen a steady rise in cyber-crime, jumping to rank as the 3rd most cyber attacked country in the world. The situation is dire.

2018-01-30

Cyber Attacks Rank Alongside Natural Disasters

A big cyber attack could cost as much as a major hurricane and like extreme weather and other natural disasters, cyber attacks are a global issue.

2018-01-31

You Probably Don’t Know All the Ways Facebook Tracks You

When you sign up with Facebook you become their product. You might not realise just how deep or extensive their tracking of your behaviour goes.

2018-01-31

Facebook Names IBM Watson Executive AI Chief

Facebook brings in an experienced ex-IBM manager to navigate the company’s broadening ambitions for how AI can shape its products.

2018-02-02

AI Will Create More Jobs Than It Eliminates

The impact on jobs from AI will take a positive turn by 2020, and will reach two million net new jobs in 2025, according to Gartner.

2018-02-01

The Role Of Blockchain In Helping Organisations Meet GDPR Compliance

Blockchain and the GDPR are two of the data management industry’s hottest buzzwords and they have more than just buzz in common.

2018-02-05

Ethical Hacking Is A Great Career Option

Ethical hackers are the most sought after professionals in the tech world. Perhaps you should consider hacking as a career option in 2018.

2018-02-05

Leaving Hacks Behind - Cybersecurity Predictions for 2018

Over 40 of the worst breaches ever happened in 2017. Organisations must become more proactive about identifying & preventing cyber threats in 2018.

2018-01-31

Cybercrime: £130bn Stolen From Consumers In 2017

Hackers stole a total of £130bn from consumers in 2017, including £4.6bn from British Internet users, according to cybersecurity experts at Norton.

2018-02-01

The World Needs More Computing Power

Microsoft's CEO says the world is rapidly "running out of computing capacity" and is calling for advances in superfast quantum machines.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ITQ

ITQ

ITQ is an IT consulting firm with a focus on the entire VMware-product portfolio with three main services: Professional Services, Support Services and Managed Services.

Tufin

Tufin

Tufin enables organizations to automate their security policy visibility, risk management, provisioning and compliance across their multi-vendor, hybrid environment.

eScan AV

eScan AV

eScan develops Information Security solutions that provide protection against current and evolving cyber threats.

SecWest

SecWest

SecWest is the organizer of CanSecWest, PACSEC, originator of PWN2OWN, security auditing, and virtual engagement/training.

Cypress Semiconductor

Cypress Semiconductor

Cypress is a semiconductor design and manufacturing company providing embedded devices for secure IoT applications.

KE-CIRT/CC

KE-CIRT/CC

KE-CIRT/CC is the national Computer Incident Response Team for Kenya.

CyberGuarded

CyberGuarded

CyberGuarded are an accredited vendor independent information security testing and auditing company.

CoursesOnline

CoursesOnline

CoursesOnline.co.uk is a database listing IT security courses from providers across the UK.

DataExpert Singapore

DataExpert Singapore

DataExpert Singapore provide solutions and services in the areas of Digital Forensics, Data Recovery, Data Duplication, Data Degaussing & Wiping, Data Destruction, and IT Disposal.

Splashtop

Splashtop

Splashtop’s cloud-based, secure, and easily managed remote access solution is increasingly replacing legacy approaches such as virtual private networks.

Colt Technology Services

Colt Technology Services

Colt Technology Services (Colt) is a global digital infrastructure company which creates extraordinary connections to help businesses succeed.

LockMagic

LockMagic

Lockmagic is an information asset management solution to protect, track, audit and control accesses to sensitive information inside and outside your organization.

Sunnic

Sunnic

Sunnic is a leading provider of comprehensive digital data security technology.

Liverton Security

Liverton Security

Liverton Security is a New Zealand-owned cyber security provider offering consultancy and security-related products to government and commercial customers throughout New Zealand.

Quantum Knight

Quantum Knight

Quantum Knight is the most performant commercial-grade embeddable cryptography. Lock down any resource from any location or device. Take control of your data now.

Prefactor

Prefactor

Prefactor was built because the problem of authenticating and authorizing users continues to be a battle engineers face globally.