NEWS > Cybersecurity News


« Back to News

2017-09-08

Crime Has Become Cybercrime

'Ordinary' criminals are making an easy transition to becoming cybercriminals and are beginning to remodel their organizations for greater efficiency.

2017-09-11

Is The US Constitutional Right To Free Speech Threatened Online?

The fate of the Daily Stormer, a Nazi hate site that has been kicked off the Internet, signals the increasing irrelevance of the 1st Amendment.

2017-09-08

US Navy’s State-of-The-Art AI Drone

The US Navy is looking for a drone that can fly over a damaged airfield and come up with a plan to get planes back in the air quickly.

2017-09-06

A Revolution In Warfare Made Possible By AI

AI is revolutionising warfare in ways similar to the invention of nuclear arms and in the same way could ultimately destroy humanity.

2017-09-06

4 Ways to Simplify Your Business Data Management

Enterprise IT managers have more data to manage than ever. Is your business trying to to manage data growth without scaling the budget?

2017-09-06

'Killer Robot' Warfare Is Coming Closer.

Top robotics experts write a letter to the UN calling for a ban on the development of "killer robots" and warning of a new arms race.

2017-09-05

ISIS Video Adds More Terror In Spain

Following the murderous assaults in Barcelona ISIS have released a new video threatening Spain with more terrorist attacks.

2017-09-05

UK Deal With EU On Post-Brexit Data Sharing

The UK is negotiating a deal over data sharing with the EU in which there are no substantial regulatory changes as a result of Brexit.

2017-09-05

Russian Hackers Feel The Heat

Used to operating with impunity, Russian cyber criminals are getting worried that US prosecutions will lead to further arrests and close them down.

2017-09-04

Online Privacy Makes A GDPR Comeback

For organisations that operate outside data-protection laws, the facade of websites, social media & Google, GDPR represents an existential threat.

2017-09-02

How Worried Should We Be About a Nuclear War With North Korea?

Rhetoric from both Kim Jong-Un and Donald Trump has once again raised the spectre of nuclear war. Opinion by Patricia Lewis

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CoSoSys Endpoint Protector

CoSoSys Endpoint Protector

Endpoint Protector by CoSoSys is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks and protects from malicious data theft.

FDM Group

FDM Group

FDM Group is an international Professional services company with a focus on IT. Services offered include Software Testing, and Information Security with a focus on operational security and compliance.

Cryptus Cyber Security

Cryptus Cyber Security

Cryptus Cyber Security is an Information Security Training company providing advanced training and services to IT Professionals.

SharkGate

SharkGate

SharGate provide a cloud-based website security solution to protect websites from being hacked.

MetricStream

MetricStream

MetricStream provide integrated GRC solutions across business, IT, and security functions.

Axiad IDS

Axiad IDS

Axiad IDS is a Trusted Identity solutions provider for enterprise, government and financial organizations.

Bavarian IT Security Cluster

Bavarian IT Security Cluster

The Bavarian IT Security Cluster works to build regional IT security competencies and increase the competitiveness and market opportunities of its member companies.

Wotan Monitoring

Wotan Monitoring

Wotan Monitoring is the software solution for fully automatic process monitoring, infrastructure monitoring and end-to-end monitoring.

KOBIL

KOBIL

KOBIL is a pioneer in the fields of smart card, one-time password, authentication and cryptography.

DigitalXRaid

DigitalXRaid

DigitalXRAID is driven and motivated to ensure the bad guys don’t win. We’re dedicated to providing our clients with state-of-the-art cyber security solutions.

TechBeacon

TechBeacon

TechBeacon.com is a digital hub by and for software engineering, IT and security professionals sharing practical and passionate guidance to real-world challenges.

Nu Quantum

Nu Quantum

Nu Quantum is developing quantum photonics hardware to power the quantum revolution in communications, sensing and computing.

Cirosec

Cirosec

Cirosec is a specialized company with a focus on information security. We carry out pentests & audits and advise our customers in the German-speaking countries on information and IT security issues.

Buchanan Technologies

Buchanan Technologies

Buchanan Technologies is a leading IT consulting and outsourcing services firm. Our methodology transforms everyday technology investments into streamlined, secure and scalable solutions.

GoodAccess

GoodAccess

GoodAccess is the cybersecurity platform that gives your business the security benefits of zero trust without the complexities so your users can securely access digital resources anytime, anywhere.

Astra Cybertech

Astra Cybertech

At Astra Cybertech, we're more than just cybersecurity experts - we're your partners in safeguarding your digital assets.