NEWS > Cybersecurity News


« Back to News

2017-11-30

Where Should The Pentagon Focus In Cyberspace?

Playing Catch-Up: The US military is still working out its tactics, techniques, command structures and procedures for operations in cyberspace.

2017-11-24

US Ready To Fight Hybrid War By 2030

The US Army expects lethal attacks in multiple domains, land, sea, air, space and cyberspace, blurring the distinction between peace and war.

2017-11-21

Cyber Security Insurance

It used to be simple …If your employee stole cash from your business or forged a cheque, an insurance policy would cover it. Not any more.

2017-11-20

North Korean Cyber Gangs Blitz the Irish

North Korean state-sponsored cyber gangs are launching almost daily attacks on Irish companies, banks and utilities.

2017-11-28

Social Media & Crisis Management

Social media has the power to connect people instantly. For security managers, it's the most powerful tool for controlling information.

2017-11-15

What Does The UK’s Data Protection Bill Mean For Business?

The UK has published the final version of a law to replace its current data security and privacy rules. What does this mean for business after Brexit?

2017-11-20

Thomson Reuters Create A Knowledge Meta-Graph

A new financial services tool charting over 2 billion connections between people, organisations & metadata within the financial ecosystem.

2017-11-27

Cyber Defense Is All About Political Decisions

One of the things democracies are least prepared to handle about a cyberattack is how quickly the response to it turns in to a political controversy.

2017-11-08

Maritime Cybersecurity: No Substitute for Testing

Preparedness, in the form of testing maritime cybersecurity via different tools to detect potential attacks, is vital for minimizing risks.

2017-11-08

UK Must Prepare For The 4th Industrial Revolution

Advanced digital technology could give UK manufacturing a huge boost and create hundreds of thousands of jobs, a new report claims.

2017-11-27

North Korea Denies Involvement In WannaCry

North Korea has challenged accusations of being behind Wannacry ransomware calling them a “wicked attempt” to tighten sanctions.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

DeviceLock

DeviceLock

DeviceLock is a leading provider of endpoint device/port control and data leak prevention software.

CERT.hr

CERT.hr

CERT.hr is the national authority competent for prevention and protection from computer threats to public information systems in the Republic of Croatia.

Precise Biometrics

Precise Biometrics

Precise Biometrics develop and sell fingerprint software for convenient and secure authentication of people’s identity in mobile devices, smart cards and other products with fingerprint sensors.

Dubai Electronic Security Center (DESC)

Dubai Electronic Security Center (DESC)

Dubai Electronic Security Center (DESC) was founded to develop and implement information security practices in Dubai.

Culinda

Culinda

Culinda secures medical IoT devices in hospitals with An Artificial Intelligence platform and security gateway.

Charterhouse Müller UK

Charterhouse Müller UK

Charterhouse Müller UK are a leading service provider for end of life IT services including data erasure and secure IT asset disposal.

Curricula

Curricula

Curricula's cyber security awareness training delivers short relatable security stories to your employees. We make learning cyber security simple and fun.

Adaptive Shield

Adaptive Shield

Addaptive Shield - Complete Control For Your SaaS Security. Proactively find and fix weaknesses across your SaaS platforms.

Association of anti Virus Asia Researchers (AVAR)

Association of anti Virus Asia Researchers (AVAR)

AVAR's mission is to prevent the spread of and damage caused by malicious software, and to develop cooperative relationships among anti-malware experts in Asia.

GeoEdge

GeoEdge

GeoEdge is the premier provider of ad security and quality solutions for the online and mobile advertising ecosystem.

Atomic Data

Atomic Data

Atomic Data is an on-demand, always-on, pay-as-you-go expert extension of your enterprise IT team and infrastructure.

ATHENE National Research Center For Applied Cybersecurity

ATHENE National Research Center For Applied Cybersecurity

ATHENE is the largest research center for cybersecurity and privacy in Europe, conducting application-oriented top-level research for the benefit of the economy, society and the state.

risk3sixty

risk3sixty

Risk3sixty are information and cyber risk management craftsmen helping build business-first security and compliance programs.

Exacom

Exacom

Exacom is a leading provider of multimedia logging/recording solutions across public safety, government, DoD, energy, utilities, transportation, and security applications.

Astran

Astran

At Astran, we revolutionize data security by introducing a groundbreaking solution for data confidentiality headaches.

Hudson Rock

Hudson Rock

Hudson Rock’s products — Cavalier & Bayonet — are powered by our cybercrime database, composed of millions of machines compromised by Infostealers in global malware spreading campaigns.