NEWS > Cybersecurity News


« Back to News

2017-08-11

The Stage Is Set For Cyber War

The after effects of the theft of secret NSA hacking exploits are having a disastrous impact on businesses and government organisations.

2017-08-11

Stolen Nude Photos & Hacked Defibrillators: Is This The Future Of Ransomware?

While recent big Ransomware outbreaks caused huge costs to the organisations they infected, they were surprisingly unrewarding for their creators.

2017-08-11

71% Of SMEs Unprepared For Cyber Risks

Small and medium sized businesses increasingly feel that they're vulnerable to cyber threats, but most aren't prepared to meet them.

2017-08-10

CEOs Are Accountable For Cyber Attacks

Tripwire says CEOs should be aware of the "basic principles of security," and in a survey of Infosecurity 2017 attendees, 40% of them agreed.

2017-08-09

Top US Cyber Official Resigns

The State Dept. 'Cyber Co-ordinator' responsible for the development of an international legal framework for cyberspace has quit his job.

2017-08-09

Hackers Steal Game of Thrones Script

TV producer HBO has been the target of a cyberattack, suffering theft of full episodes of upcoming shows and scripts for Game of Thrones.

2017-08-09

Snowden Criticises Russian Decision To Ban VPNs

"If the next generation is to enjoy the online liberties ours did, innocuous traffic must become truly indistinguishable from the sensitive."

2017-08-08

The Rise Of The Introvert: Is There An IT Personality?

Clichés about introverted personality types dominate jokes about the IT, security and espionage professions. Is there any truth in the stories?

2017-08-07

Briton Who Stopped WannaCry Arrested

"Accidental Hero" who found the hidden Wannacry killswitch is arrested by the FBI charged with writing malicious software targeting bank accounts.

2017-08-07

S. Korea Spy Agency Attempted To Rig Election

Electoral manipulation. Fake news. Surveillance of opposition politicians. That doesn't happen in mature democratic countries, does it?

2017-08-02

Cyber Criminals Target Your Text

A text message scam called "smishing" that can infect your smartphone and let thieves steal your personal information.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CERT.at

CERT.at

CERT.at is the Austrian national Computer Emergency Response Team.

Centripetal Networks

Centripetal Networks

Centripetal Networks was founded with one vision - to protect networks from advanced threats by simplifying intelligence-driven security.

PrimaTech

PrimaTech

PrimaTech provide process safety, cyber and process security, and risk management consulting, training and software for the process industries.

Apomatix

Apomatix

Apomatix is a platform that simplifies the complexity of cyber risk audit and management.

VigiTrust

VigiTrust

VigiTrust is a security firm specializing in cloud based eLearning programs, security compliance portals and providing security assessments.

CyberWarrior

CyberWarrior

CyberWarrior deliver training and consulting for some of the world’s top brands and also partner with national systems integrators to augment their teams with our expertise.

Dark Cubed

Dark Cubed

Dark Cubed is an easy-to-use cyber security software as a service (SaaS) platform that deploys instantly and delivers enterprise-grade threat identification and protection at a fraction of the cost.

Governikus

Governikus

Governikus provides solutions for secure data transport, authentication, the use of electronic signatures and cryptography as well as for long-term storage.

Ziroh Labs

Ziroh Labs

Ziroh Labs leverages advanced cryptography to keep your highly sensitive, private data safe throughout the lifecycle of data.

Allthenticate

Allthenticate

Allthenticate Single Device Authentication (SDA), enables seamless authentication in both the physical and digital words while unifying management in one easy-to-use interface.

VeriClouds

VeriClouds

VeriClouds is a password verification service that helps organizations detect compromised passwords and stop account takeover attacks.

AirEye

AirEye

AirEye is a leader in Network Airspace Protection (NAP). Block attacks against your corporate network launched from wireless devices in your corporate network airspace.

Mitiga

Mitiga

Mitiga uniquily combines the top cybersecurity minds in Incident Readiness and Response with a cloud-based platform for cloud and hybrid environments.

Alpha Mountain AI (alphaMountain)

Alpha Mountain AI (alphaMountain)

alphaMountain provides up-to-date domain and IP intelligence for cybersecurity investigational and protection platforms.

Myota

Myota

Myota intelligently equips each file to be resilient and achieve Zero Trust-grade protection. Withstand ransomware and data breach attacks. Reduce data restoration time and effort.

Flow Security

Flow Security

Enterprises run on data, Flow secures it at runtime. With a runtime-first approach, Flow is a game-changer in the data security space, securing data itself, beyond the infrastructure it resides in.