NEWS > Cybersecurity News


« Back to News

2017-08-25

Tech Giants Put Big Data To Work

The most important aspect of big data is it’s ubiquity throughout the market and availability to all businesses, large and small.

2017-08-22

Hackers Target The Shipping Industry

The shipping industry is now painfully aware that physical shipping operations are vulnerable to digital disruption.

2017-08-29

Cyber Criminals Have Access To Weapons Grade Hacking Tools

Businesses need to seriously rethink cyber defence with powerful nation-state attack hacking tools now in the hands of ordinary cyber criminals.

2017-08-29

Android Apps With Spy Software

Security researchers warn against using certain phone messenger applications which have the capability to steal data from the devices they infect.

2017-08-22

Very Few UK Girls Took Computing A-level

A worrying statistic for the tech industry: In freshly-released A-level data, only 9.8% of those completing a computing course were girls.

2017-08-21

4 Steps Toward A GDPR Compliance Audit

Many organisations are starting to feel stressed and perhaps a bit confused by the General Data Protection Regulation. Here's where to start.

2017-08-24

Organisations Need A Data Ethics Strategy

“Data ethics” can give companies a competitive edge by protecting personal data, especially when their target customers value social responsibility.

2017-08-23

The “augmented human” Concept Becomes Reality

We carry health sensors on our wrist, and our Apple Watch is becoming our personal physician. These concepts are transforming the insurance industry.

2017-09-01

A Robot Won’t Steal Your Job Just Yet…

The technology industry likes to talk about how automation is set to change the world. But amid all the futurism, one thing gets lost: actual robots.

2017-08-24

Firms Underrate The ‘Seismic Aftershock’ Of An Attack

UK businesses are overconfident in their cybersecurity planning & underestimate the damage of the “seismic aftershock” following a breach.

2017-09-01

What is Machine Learning?

Building systems that learn from data is a better way to solve complex problems, given enough meaningful data to learn from.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Akademie (CAk)

Cyber Akademie (CAk)

Cyber Akademie is a training and education center providing high-quality training and information events on information security and data protection.

Micro Strategies Inc.

Micro Strategies Inc.

Micro Strategies provides IT solutions that help businesses tackle digital transformation in style.

Worldline

Worldline

Worldline IIoT solutions allow industrial companies to start their digital transformation journey with industrial level cyber security standards (IEC 62443 ready).

ComoNExT Innovation Hub

ComoNExT Innovation Hub

ComoNExT is a Digital Innovation Hub and a startup incubator with a focus on the issues of digital transformation and Industry 4.0.

DisruptOps

DisruptOps

Built for today’s cloud-scale enterprises, DisruptOps’ Cloud Detection and Response platform automates assessment and remediation procedures of critical cloud security issues.

Dashlane

Dashlane

Dashlane puts all your passwords, payments, and personal info in one place that only you control. So you can use them instantly. Securely. Exactly when you need them.

Next Peak

Next Peak

Next Peak provides cyber advisory and operational services based on deep business and national security experience, thought leadership, and a network of front-line defenders.

Xmirror Security

Xmirror Security

Xmirror Security focuses on integrated detection and defense of the continuous threat to the DevSecops software supply-chain with artificial intelligence technology as the core.

Involta

Involta

Involta orchestrates IT transformation journeys using well-defined and rigorous processes to deliver hybrid cloud solutions, consulting and data center services tailored to our clients’ needs.

Cyber Proud

Cyber Proud

Cyber proud is leading a talent revolution to promote and create an inclusive skilled cyber workforce.

CyberSecureRIA

CyberSecureRIA

We founded CyberSecureRIA specifically to secure and support RIAs. We exist to secure SEC-registered RIAs, and keep them compliant with cybersecurity regulations.

Judy Security

Judy Security

Judy (formerly AaDya Security) provides smart, simple, effective, all-in-one cybersecurity for SMBs. Get the 24/7 protection and support you deserve, at a price you can afford.

Sunnic

Sunnic

Sunnic is a leading provider of comprehensive digital data security technology.

CIP Cyber

CIP Cyber

CIP Cyber is an online learning community with a mission of connecting, training, and certifying cybersecurity professionals to protect critical infrastructure.

modePUSH

modePUSH

modePUSH is a cybersecurity company focused on end-to-end breach response from Digital Forensics to Restoration across the enterprise and cloud environments.

SecureCyber

SecureCyber

Secure Cyber Defense offers industry-leading technology and managed detection and response solutions.