NEWS > Cybersecurity News


« Back to News

2017-10-05

Las Vegas Murders: Fake News Follows Every Tragedy

It’s an unfortunate reality that every tragedy breeds not just misunderstandings, but outright conspiracies and lies on social media.

2017-11-07

Three Ways The IoT Can Drive Business Value

It’s not always clear exactly how businesses & customers are supposed to actually benefit from IoT. The experts at Forrester think they know how.

2017-11-01

Big Data And Policing

Big data technology is revolutionising many domains, including the retail, healthcare and transportation sectors. Not so for British policing.

2017-11-06

South Korean Banks Brace For Electro-Magnetic Pulse

South Korean banks are drawing up plans to protect critical electronic data from a potential electromagnetic pulse attack by North Korea.

2017-10-30

Chinese & S. Korean Regulators Says ICO Investors At Risk

The up-and-coming method of raising funding via tokens based on the cryptocurrency Ethereum is unregulated with a huge potential for fraud.

2017-10-27

A New Approach To Combat Phishing

Major data breaches can start with a simple email. But providing employee training to combat phishing is a failing strategy.

2017-10-27

Facial Recognition Works on iPhone X. Sometimes.

The iPhone X might be the future of Apple’s smartphone design but its innovative Face ID struggles with under 13s, siblings or twins.

2017-10-27

Postmortem: WannaCry Ransomware Explained

WannaCry ransomware consists of multiple components infecting Windows operating systems. But the speed of its spread is something special.

2017-10-26

Innovation in Cloud-Based Video Analytics

Video analytics for the security industry is going through a rapid technological shift to smarter cloud-based, real-time and pro-active systems.

2017-10-26

Healthcare Suffers Most Cyber Security Incidents

McAfee say the healthcare industry is highly vulnerable and accounted for 26 percent of security incidents in the second quarter of 2017.

2017-10-25

Nuclear Missiles Are Not N.Korea’s Only Threat

North Korea has launched 22 missiles in 15 tests in 2017. But the true risk is lies in its cyberattack capabilities, which are in very active service.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DCL Search & Select

DCL Search & Select

DCL Search & Selection connect candidates to the best companies in the IT Security, Telco, UC, Outsourcing, ERP, Audit & Control markets.

Arxan Technologies

Arxan Technologies

Arxan is a leader of application attack-prevention and self-protection products for Internet of Things (IoT), Mobile, Desktop, and other applications.

Foundation Futuristic Technologies (FFT)

Foundation Futuristic Technologies (FFT)

FFT is a global leader in computer forensics and digital investigation solutions.

BCS Financial

BCS Financial

BCS Financial delivers financial and insurance solutions. Specialty risk products include Cyber and Privacy Liability insurance.

Veracity Industrial Networks

Veracity Industrial Networks

Veracity provides an innovative industrial network platform that improves the reliability, efficiency, and security of industrial networks and devices.

Nucleon

Nucleon

Nucleon enables cybersecurity tools, organizations and software developers to become proactive by blocking threats before they become breaches.

SYSGO

SYSGO

SYSGO is the leading European provider of real-time operating systems for critical embedded applications in the Internet of Things (IoT).

ThreatSwitch

ThreatSwitch

ThreatSwitch a software platform for cleared federal contractors to get and stay compliant with NISPOM and Conforming Change 2.

Hut Six Security

Hut Six Security

Train, test and track your Information Security culture through information security awareness training and customised phishing simulation campaigns.

Motorola Solutions

Motorola Solutions

Motorola Solutions build mission-critical services, software, video and analytics, backed by secure, resilient land mobile radio communications.

ReasonLabs

ReasonLabs

ReasonLabs have created a next-generation anti-virus that is enterprise grade, yet accessible to any personal device around the world.

TachTech

TachTech

TachTech is passionate about trust, security and privacy in the digital world. We create tailored security and compliance solutions to improve your business.

Xantaro

Xantaro

Xantaro specializes in technologies, software and services for Carriers, ISPs, Hosting and Cloud Providers as well as for Operators of Data Centres and Campus Networks.

Frenos

Frenos

The Frenos Platform helps enterprises understand their most probable attack paths while highlighting the most effective risk mitigations to deter and defend against today’s adversaries.

Neptune Shield

Neptune Shield

Neptune Shield's mission is to deliver cutting edge Maritime focused Cyber Security & Threat Protection through our Hampton Roads based Tech & Cyber Security Hub.

YSecurity

YSecurity

At YSecurity, we simplify compliance, prevent breaches, and help startups scale with confidence. Focus on growth—we’ll handle the security.