NEWS > Cybersecurity News


« Back to News

2018-01-22

How To Handle A Cyber Crisis

An unnamed Canadian Bank didn’t know how to publicly manage a cyber crisis and called in the experts. Here is their advice.

2018-01-22

Twitter Reveals True Extent Of Russian US Election Posts

Twitter has admitted that a far greater number of Russia-linked accounts posted material about the 2016 US election than it has previously disclosed.

2018-01-22

Massive Breach: 3m Healthcare Records Compromised

Healthcare records of three million Norwegians compromised in "professional" cyber attack.

2018-01-19

The Big Online Advertising Swindle

Fake news, concerns over privacy and political manipulation are some of the issues swirling around social media. There is also advertising fraud.

2018-01-17

Iran’s Internal Conflict Plays Out On Social Media

Disinformation, Bots, #Hashtag wars. The civil unrest on the streets of Iran is being mirrored on social media, where government and protesters clash.

2018-01-17

Applying Blockchain to Cybersecurity

Blockchain technology's key attribute is that it enables secure information transmission on the network with no human involvement. That's useful.

2018-01-17

AI Powers VW’s New Electric Microbus

VW is working with NVidia to deliver AI features to the next generation of its vehicles, like speech & gesture recognition and driver monitoring.

2018-01-16

What You Need to Know About The General Data Protection Regulation

The GDPR Advisory Board answers questions about workforce training and the ways to become legally compliant before the May 2018 deadline.

2018-01-18

Russian Hackers Trying To Infiltrate US Senate

Russian hackers accused of breaching the US Democratic Party and meddling in the French Presidential election are targeting US Senators.

2018-01-18

Cyber Attacks Will Continue to Succeed

Spectre and Meltdown demonstrate weaknesses in current hardware cybersecurity that will force a paradigm shift within the semiconductor industry.

2018-01-23

AI Can Simplify The Purchasing Process For Business

US government workers and contractors could use AI to navigate regulations to make the federal purchasing process cheaper and less complex.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Wisegate

Wisegate

Wisegate is a community of IT experts providing advisory services on all areas of IT including security.

Waterfall Security Solutions

Waterfall Security Solutions

Waterfall Security is focused on protecting critical infrastructure and industrial control systems from remote online cyber attacks,

Kore Telematics

Kore Telematics

Kore is a leading managed service provider for IoT and M2M applications.

IS Decisions

IS Decisions

IS Decisions builds affordable and easy-to-use Access Management software solutions, allowing IT teams to effectively secure access to Active Directory infrastructures, SaaS apps and data within.

Automation & Cyber Solutions (ACS)

Automation & Cyber Solutions (ACS)

Automation & Cyber Solutions delivers a range of Industrial Automation and Cyber solutions & services to sectors including Oil & Gas, Chemicals & Petrochemicals, Power and others.

Assured Enterprises

Assured Enterprises

Assured Enterprises provides comprehensive cyber risk identification, management and mitigation across all platforms.

Clari5

Clari5

Clari5 redefines real-time, cross channel banking Enterprise Fraud Management using a central nervous system approach to fight financial crime.

Alpine Security

Alpine Security

Alpine Security provides penetration testing, security assessments and cybersecurity training services.

ShorePoint

ShorePoint

ShorePoint is an elite cybersecurity firm dedicated to improving the cyber resilience of Federal agencies and their missions.

Kodem Security

Kodem Security

Our mission is to make AppSec simple. Meet the world’s first dynamic software composition analysis platform. Only Kodem uses runtime intelligence to determine application risk.

ISO WISH

ISO WISH

Take your Business to the Next Level with ISO Certification in UAE.

All About Cookies

All About Cookies

All About Cookies is an informational website that provides tips, advice, and recommendations to help you with Online Privacy, Identity Theft Prevention, Antivirus Protection, and Digital Security.

Cribl

Cribl

Cribl, the Data Engine for IT and Security, empowers organizations to transform their data strategy.

Clango

Clango

Clango employs an identity-centric approach to optimizing your cybersecurity investment while minimizing risk.

Siguria Kibernetike (Cyber Security)

Siguria Kibernetike (Cyber Security)

Siguria Kibernetike is a company based in Tirana that offers full service in the field of cyber and physical security.

Secure Domains

Secure Domains

Secure Domains is the first company in the GCC to offer cloud-based DNS firewall services and security through its flagship SaaS product, DNS Armor.