NEWS > Cybersecurity News


« Back to News

2018-01-19

Russian Troops Use Missiles & Cyber To Counter 'swarm of drones'

The Russian military says it has fought off an attack by a swarm of drones launched by jihadists against its Tartus airbase in Syria.

2018-01-22

4 Steps To Get Ready For GDPR

For organisation that do business in the EU in any capacity the General Data Protection Regulation (GDPR) is a crucial piece of legislation.

2018-01-19

FBI's Ability To Disrupt Cybercrime Has Deteriorated

FBI agents took down or disrupted only about one-tenth as many cyber-criminal operations they did three years ago.

2018-01-16

The Top 5 Tech Trends For 2018

As the technological trends keep on advancing in our digital era, 2018 is expected to be a big year for significant updates to existing products.

2018-01-16

Inside the Intel Chip Security Problem

Technology companies are still scrambling to fix serious security flaws affecting computer processors built by Intel and other chipmakers.

2018-01-15

VW and Hyundai To Offer Autonomous Cars

Self-driving taxis will be the staring point for autonomous vehicles offered by the big car companies as they link with technology partners.

2018-01-15

2018 Predictions: Full-Scale Cyber War

Cyberwar looms large as both nation states and law enforcement agencies worldwide will begin to use cyber tactics offensively in the next 12 months.

2018-01-15

Iran’s Cyber Capabilities

Offensive cyber operations have become a core tool of Iranian statecraft, gathering information against enemies at home and abroad.

2018-01-12

Iran’s Cyberwar Could Infiltrate Your Mailbox

Iran’s police crackdown on protesters could affect almost anyone who has been in contact with dissident groups, even people only distantly linked.

2018-01-15

A Plausible Domestic Hack To Beware Of

New hacking methods are replacing some well established crimes like domestic burglary and face -to -face fraud. Don't become a victim.

2018-01-12

Healthcare Organisations In The Cloud

Healthcare data is among the most valuable commodities sought by hackers; healthcare organisations migrating the the Cloud must take care.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Continuity Shop

Continuity Shop

Continuity Shop provides training and consultancy in Business Continuity and Information Security to some of the world's biggest organisations.

Cyber 360

Cyber 360

Cyber 360 is a Cybersecurity contract and fulltime placement firm dedicated to identifying and hiring Cybersecurity professionals.

I-Tracing

I-Tracing

I-TRACING are experts in IT security, specialized in legal compliance of information systems, security of information systems, and the collection of digital evidence and traces.

Myra Security

Myra Security

Myra technology monitors, analyzes, and filters malicious internet traffic before virtual attacks can do any real harm.

redGuardian

redGuardian

redGuardian is a DDoS mitigation solution available both as a BGP-based service and as an on-premise platform.

Vortiv

Vortiv

Vortiv Ltd (formerly known as Transaction Solutions International Ltd) is a technology based company focused on the cybersecurity and the cloud services sector.

Venkon

Venkon

Venkon provides effective and unique solutions to cyber-security threats and IT compliance requirements of your organization.

Eureka Technology Partners

Eureka Technology Partners

Eureka Technology Partners are committed to helping you focus on your business by taking care of your IT infrastructure and data security needs.

Iterasec

Iterasec

Iterasec provides a full range of security services to hacker-proof your products and make software engineering process secure by design.

Avocado Consulting

Avocado Consulting

Avocado helps clients deliver with certainty on their complex IT change, with technology services that automate, monitor and optimise.

CodeLock

CodeLock

Codelock is a patent-pending solution that continuously provides software security at the code level, while providing advanced management insights with performance metrics and data analytics.

Gogolook

Gogolook

Gogolook is a leading TrustTech company. With "Build for Trust" as its core value, it aims to create an AI- and data-driven global anti-fraud network as well as Risk Management as a Service.

SecureLake

SecureLake

SecureLake (formerly Managni) is one of the most trusted US-based IT security and infrastructure companies.

Miggo Security

Miggo Security

Miggo is the first Application Detection and Response (ADR) platform on a mission to stop application breaches.

CyXcel

CyXcel

CyXcel is a cyber security consulting business grounded in the law which natively fuses crises, legal, technical, and consulting expertise digital networks, information and operational technology.

IDCARE

IDCARE

IDCARE is Australia and New Zealand’s national identity & cyber support service. Our service is the only one of its type in the world.