NEWS > Cybersecurity News


« Back to News

2018-02-01

The ‘Complete’ History of 'Fake News'

How did the term "fake news" evolve, and what's next in the world of disinformation?

2018-01-30

US Banks Face A Growing Threat

US Banks relying on third-party firms for support and defence against cyber- attackers are making the challenges they face even more complex.

2018-01-30

Looming Cyber Threats From Russia & N. Korea

Threats from Russia & N.Korea have increased and cybercriminals have improved their tactics, techniques & procedures, according to Flashpoint.

2018-01-29

Google’s AutoML Offers Machine Learning Models Without Having To Code

AutoML Vision helps developers, including those with no machine learning expertise, build custom image recognition models.

2018-01-29

Making Data Scientists More Productive

Business is adopting a self-service model for their data scientists and using 'data curators' to make these highly skilled specialists more productive.

2018-01-29

India’s Political Parties Fighting A Cyberwar

Indian regional elections are highly contested and this year the arguments in Karnataka State are spurring big growth in social media traffic.

2018-01-29

Get Serious About Hardware Cybersecurity

Meltdown and Spectre highlight the need to defend against vulnerabilities in embedded hardware for critical infrastructure.

2018-01-26

Russia Will Create Its Own Internet

Russia is declaring independence from ICANN and will set up its own network of root servers for its domestic market and those of other BRIC nations.

2018-01-26

Cyber Insurance: Good News & Bad News

Cybersecurity insurance is critical. Without this essential service, you could suffer a cyberattack that kills your business for good.

2018-01-26

Employees Are Key To Cybersecurity

Insiders are the largest source of corporate data breaches, inadvertent or malicious, yet 55% do not get any training.

2018-01-25

Pentagon Considers Nuclear Retaliation To Big Cyber Attacks

An extreme response to an extreme problem: Why use hack-back tactics when you can drop a nuke on your cyber attackers?

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Blue Solutions

Blue Solutions

Blue Solutions is a consultancy-led, accredited software distributor who provides IT solutions and support to small and medium enterprises.

Wall Street Technology Association (WSTA)

Wall Street Technology Association (WSTA)

The Wall Street Technology Association (WSTA) provides financial industry technology professionals with forums to learn from and connect with each other.

Rackspace Technology

Rackspace Technology

Rackspace Technology is a leading provider of managed services across all major public and private cloud technologies. Secure your IT environments with powerful cloud security solutions and support.

Dcoya

Dcoya

Dcoya's complete security awareness training program gives you out-of-the-box compliance with PCI-DSS, HIPAA, SOX and ISO regulations.

QOMPLX

QOMPLX

QOMPLX integrate, contextualize, and analyze data from virtually any source to help you identify operational risk and inefficiencies throughout the enterprise.

IoTsploit

IoTsploit

IoTsploit provides 20/20 visibility of network connections, protecting critical infrastructure assets from IoT vulnerabilities.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

PeopleSec

PeopleSec

PeopleSec specializes in the human element of cybersecurity with a comprehensive set of services designed to maximize your security by educating your workforce as a whole.

Pivot Point Security

Pivot Point Security

Pivot Point Security is a trusted leader in information security consulting. We help clients master their information security management systems.

Servian

Servian

Servian is one of Australia's leading IT consultancies, with expertise in cloud, data, machine learning, DevOps and cybersecurity.

Wayra

Wayra

Wayra connects Telefónica and technological disruptors around the world. As their preferred strategic partner, we scale them up to accelerate their business and ours.

10dot Cloud Security

10dot Cloud Security

10dot Cloud Security is a security service management company. Our solutions give you contextualised visibility into your network security.

Oligo Security

Oligo Security

Oligo aims to streamline the usage of open source by making it secure and easy to protect. Through focusing developers on the relevant vulnerabilities we make the fixing process significantly shorter.

CyberForce Global

CyberForce Global

CyberForce Global are at the forefront of start-up technology recruitment in areas including cybersecurity, IT infrastructure, software, fintech, blockchain and more.

Lumos

Lumos

Lumos, the Unified Access Platform to manage all access to apps and data.

Rankiteo

Rankiteo

At Rankiteo, we are pioneers in cybersecurity risk management. Our mission is to empower organizations with the tools they need to assess, enhance, and safeguard their digital landscapes.