NEWS > Cybersecurity News


« Back to News

2017-08-02

Room At The Top For Women In Tech

It is possible for the tech industry, including data and analytics, to increase the number of C-suite women, even starting from a low base?

2017-08-02

Russian Arrested For $4billion Bitcoin Theft

The “internationally sought mastermind of a crime organisation” Alexander Vinnik is accused of laundering more than $4bn in bitcoin.

2017-08-08

North Korean Cyber 'tunneling' In New Zealand

NZ electronic security agents are investigating whether North Koreans are "tunnelling in" to New Zealand computer servers.

2017-08-10

Who Is Responsible for Cloud Security?

IT pros want to apply the same level of security to their cloud deployments as to internal resource and true cloud security requires a collaborative effort.

2017-08-11

Dangers Of Betting On Hybrid Cloud

Hybrid cloud’s popularity might prove to be a transitional stage, distracting companies from properly implementing data security.

2017-08-08

What Will The Car Of 2040 Be Like?

The car of the future is still in flux with driver autonomy & powertrains in question; There are broadly two routes down which the car can wind to 2040.

2017-08-09

@Home With iRobots

Is it possible that one of the impacts of virtual reality will be better indoor maps of the reality we are already in - or is it just eroding privacy?

2017-08-08

88% Feel Vulnerable To Data Threats

Organisations are increasingly aware of the threat posed by data breaches, according to Thales’ 2017 Data Threat Report.

2017-08-09

London Police Hampered By Encryption

London's Met Police chief says the fight against terrorism is being made tougher by encryption on the web and messaging services like WhatsApp.

2017-08-04

TalkTalk Still Feeling The Effects Of Cyber Attack

UK telecoms business TalkTalk is still counting the costs: Profits hammered. Customers deserting. The CEO replaced.

2017-08-07

UK Drone Registration Coming

The UK government has announced a plan to require drone owners to register their devices with the aim of ensuring safer use of the technology.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Exploit Database (EDB)

Exploit Database (EDB)

The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

Titus

Titus

Titus is a global leader in enterprise-grade data protection solutions.

CSIRT.CZ

CSIRT.CZ

CSIRT.CZ is the National Computer Security Incident Response Team of the Czech Republic.

Datiphy

Datiphy

Datiphy's data-centric security platform uses behavioral analytics, and data-centric auditing and protection capabilities to mitigate risk.

Wavestone

Wavestone

Wavestone is a strategy and technology consulting company with areas of expertise including digital transformation and cybersecurity.

IoT European Research Cluster (IERC)

IoT European Research Cluster (IERC)

IERC brings together EU-funded projects with the aim of defining a common vision for IoT technology and development research challenges.

Silverskin Information Security

Silverskin Information Security

Silverskin is a cyber attack company that specializes in having knowledge of the attacker's mindset to identify vulnerabilities and build effective and persistent defences.

Recruit.net

Recruit.net

Recruit.net allows job seekers to instantly find millions of jobs from thousands of web sites with a single search.

Touchstone Security

Touchstone Security

Touchstone Security is a company with a passion for technology, a hyper-focus on cybersecurity, and a special affinity for cloud technology.

Lumu Technologies

Lumu Technologies

Lumu is a cybersecurity company that illuminates threats and attacks affecting enterprises worldwide.

Bechtle

Bechtle

Bechtle is one of Europe’s leading IT service providers offering a blend of direct IT product sales and extensive systems integration services.

Amvia

Amvia

Amvia is a fast-growing telecoms, Internet and Microsoft service provider. We supply voice, data and cyber security services to 100s of small and large companies.

CAT Labs

CAT Labs

CAT Labs is building digital asset recovery and cybersecurity tools to enable governments to fight crypto crime and to protect investors from hacks, fraud and scams.

Closed Door Security

Closed Door Security

Closed Door Security is the only cybersecurity team in the north of Scotland offering everything from IASME Certification to CREST-Accredited penetration testing.

Cyber Guru

Cyber Guru

Cyber Guru is an effective cybersecurity awareness training platform, enabling organisations to increase their resistance to cyber-attacks by changing employee behaviour.

Boo Consulting

Boo Consulting

Boo Consulting is a trusted privacy and risk consultancy firm. We are driven to help you find an appropriate solution that will suit your budget and requirements.