NEWS > Cybersecurity News


« Back to News

2018-01-25

World Economic Leaders Fear Increasing Cyber Attacks

World leaders at WEF in Davos are contemplating a “deteriorating geopolitical landscape” where cybersecurity has jumped right up the agenda.

2018-01-24

Companies Are Buying Cyber Insurance 'in mad panic'

Many firms feel under siege from cyber attackers. But can insurers quantify the risk accurately and could insurance lead to corporate complacency?

2018-01-24

What Is Fog Computing?

An architecture that distributes resources of computing, storage, control and networking along the continuum from Cloud to Things.

2018-01-24

Stuxnet: The Father Of Cyberkinetic Weapons

Its the 10th anniversary of the Stuxnet attack on the Iranian nuclear weapons program. The world’s first cyber weapon opened Pandora’s box.

2018-01-23

Army Chief Urges UK To Increase Cyber Defence & Attack Capabilities

The UK’s ability to respond to threats will be eroded if the country does not keep up with its adversaries in terms of defence spending.

2018-01-23

Facebook Users To Rank The News They Trust

Facebook plans to diminish its role as an arbiter of the news people see and will rank news organisations by credibility based on user feedback.

2018-01-23

Insiders Are Behind Most Business Cybersecurity Incidents

Insider threats are a much bigger risk to cyber security than external hackers, with 74% of cyber incidents happening from within companies.

2018-01-22

The CIA Discovers It Has A Mole

The arrest of a former CIA case officer sheds light on a shadowy counterintelligence drama that has been playing out for nearly eight years.

2018-01-22

How To Handle A Cyber Crisis

An unnamed Canadian Bank didn’t know how to publicly manage a cyber crisis and called in the experts. Here is their advice.

2018-01-22

Twitter Reveals True Extent Of Russian US Election Posts

Twitter has admitted that a far greater number of Russia-linked accounts posted material about the 2016 US election than it has previously disclosed.

2018-01-22

Massive Breach: 3m Healthcare Records Compromised

Healthcare records of three million Norwegians compromised in "professional" cyber attack.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Splunk

Splunk

Splunk provide real-time Security Information & Event Management solutions for Enterprise Networks, Cloud and small-scale IT environments

Potomac Institute for Policy Studies

Potomac Institute for Policy Studies

Potomac Institute undertakes research on key science, technology, and national security issues facing society, Study areas include cybersecurity.

Cyber Risk Agency

Cyber Risk Agency

Cyber Risk Agency is a cybersecurity consulting firm specializing in managing cyber risks for SMEs.

Maverick Technologies

Maverick Technologies

Maverick is an industrial automation, enterprise integration and operational consulting company. Services include industrial cyber security.

Averon

Averon

Averon's technology is the new gold standard for digital identity - the easiest, fastest and most secure verification solution for users on both WiFi and LTE.

IAmI Authentications

IAmI Authentications

IAmI is a first in Tokenization Cloud-based IAM Security Services, delivering the most advanced form of Two-Factor Authentication.

TechStak

TechStak

TechStak is the easiest way for businesses to find and connect with IT Pros and other technology solution providers in their area.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Pivot Point Security

Pivot Point Security

Pivot Point Security is a trusted leader in information security consulting. We help clients master their information security management systems.

HighPoint

HighPoint

HighPoint is a leading technology infrastructure solutions provider offering consultancy, solutions and managed services for network infrastructure and cybersecurity.

Berezha Security Group (BSG)

Berezha Security Group (BSG)

BSG is a cybersecurity consulting firm specializing in all aspects of application security and penetration testing.

doIT Solutions

doIT Solutions

doIT solutions specialize in IT security and infrastructure, security automation, data center, and cybersecurity.

Protecto

Protecto

Make privacy and governance effortless. Brakes allow you to drive faster. Stronger data privacy and security enable companies to unlock the full potential of the data.

Evervault

Evervault

Evervault provides engineers easy solutions to complex data security and compliance problems.

Finlaw Associates

Finlaw Associates

Finlaw Associates is a trusted cybercrime law firm providing a wide range of taxation, legal, advisory and regulatory services to the financial, commercial and industrial communities.

Octopus Cybersecurity

Octopus Cybersecurity

Octopus VAR is a Validation, Analysis and Reporting tool that gives risk managers and CISOs a powerful control mechanism and a deep view of operational risks.