NEWS > Cybersecurity News


« Back to News

2017-10-12

More Sensitive US Voter Records Leaked

Alaskan Voters AWOL: A cache of voter records on over a half-million US citizens has been found posted online.

2017-10-12

In Demand: New Tech Against Drone Attacks

Critical infrastructure and public security are highly exposed to the threat of drone attacks and this is a big concern for law enforcement worldwide.

2017-10-12

Russia’s Digital Weapons Refined Against Ukraine

Russia is developing and refining a generation of powerful new cyber weapons by experiment on neighbouring Ukraine.

2017-10-11

Kaspersky Says We Can Trust Him

Eugene Kaspersky denies that firm he founded is too close to the Russian government and insists it poses no danger to its American customers.

2017-10-11

Preventing The Hacked AI Apocalypse

As attacks are an increasingly worrisome threat to the performance of artificial intelligence applications, can AI be trusted?

2017-10-02

Equifax Executives Resign Without Charge

After an estimated 143 million Americans' personal information was accessed by hackers targeting Equifax Inc. the CIO and CSO step down.

2017-10-10

Transforming Your Database

The love affair with the big matrix of bits is slowly fading as developers are realizing that not everything fits into a simple table.

2017-10-09

A 9-Step Guide For GDPR Compliance

In May 2018, the General Data Privacy Regulation will take effect, significantly altering the way organisations handle and store data. Be prepared.

2017-10-09

British Police’s First Cyber Dogs

Police are using the detection dogs to track down computer software hidden in homes of suspected sex offenders.

2017-10-02

Facebook To Give Congress Thousands Of Election Ads Bought By Russians

Full Disclosure: Facebook will provide US Govt. thousands of ads purchased by Russians during the 2016 US presidential race.

2017-10-09

Iranian Hackers Linked To Malware

Iran has earned a reputation for aggressive state-sponsored hacking, stealing data from corporate and government networks around the world.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Nuvias Group

Nuvias Group

Nuvias Group is a specialist value-addedd IT distribution company offering a service-led and solution-rich proposition ready for the new world of technology supply.

SAS Institute

SAS Institute

SAS is a leader in business analytics software and services providing solutions for a wide range of critical business areas including risk management, compliance and fraud prevention.

SecuPi

SecuPi

SecuPi delivers data-centric security with data-flow discovery, real-time monitoring, behavior analytics, and protection across web and enterprise applications and big data environments.

Cybersecurity & Infrastructure Security Agency (CISA)

Cybersecurity & Infrastructure Security Agency (CISA)

CISA leads the national effort to defend critical infrastructure against the threats of today and to secure against the evolving risks of tomorrow.

Veracity Industrial Networks

Veracity Industrial Networks

Veracity provides an innovative industrial network platform that improves the reliability, efficiency, and security of industrial networks and devices.

Cyber Range Malaysia

Cyber Range Malaysia

With Cyber Range Malaysia organizations can train their security professionals in empirically valid cyber war-gaming scenarios necessary to develop IT staff skills and instincts for defensive action.

Qmulos

Qmulos

Qmulos’ real-time continuous monitoring risk management suite, Q-Compliance, provides a massively flexible and scalable solution to optimizing operational security.

CyberSN

CyberSN

CyberSN is your essential partner in cybersecurity workforce risk management offering solutions that empower leaders to diversify, acquire, retain, and develop their cybersecurity teams.

KryptoKloud

KryptoKloud

KryptoKloud offer a suite of Managed Services including Security Monitoring and Incident Response as well as a full portfolio of Compliance, Governance and Audit solutions.

Eastern Cyber Resilience Centre (ECRC)

Eastern Cyber Resilience Centre (ECRC)

The Eastern Cyber Resilience Centre is part of the national roll out of Cyber Resilience Centres in the UK which began in 2019.

ISECURION Technology & Consulting

ISECURION Technology & Consulting

ISECURION is an information security consulting company. We provide a unique blend of services to our customers catering to the current information security landscape.

ASRC Federal

ASRC Federal

ASRC Federal’s mission is to help federal civilian, intelligence and defense agencies achieve successful outcomes and elevate their mission performance.

Canadian Cyber Threat Exchange (CCTX)

Canadian Cyber Threat Exchange (CCTX)

The CCTX is Canada’s not-for-profit, private-sector cyber threat sharing hub and collaboration centre.

Aardwolf Security

Aardwolf Security

Aardwolf Security specialise in penetration testing to the highest standards set out by OWASP. We ensure complete client satisfaction and aftercare.

Closed Door Security

Closed Door Security

Closed Door Security is the only cybersecurity team in the north of Scotland offering everything from IASME Certification to CREST-Accredited penetration testing.

turingpoint

turingpoint

turingpoint GmbH is a tech enabled boutique consultancy. It was founded by security experts with a focus on cyber security and software solutions.