NEWS > Cybersecurity News


« Back to News

2017-07-12

Australia’s Sharp Turn To Information Warfare

The Australian government responds to regional threats and moves towards the defence concept of 'information dominance'.

2017-07-12

Islamic State On The Internet

Project TENSOR: British police working on improving methods of detecting terrorist content

2017-07-11

Insurance: How Cyber Risks Are Evolving

Lloyds of London say that both the costs and the ways in which companies can be targeted by organised cyber criminals are increasing.

2017-07-11

Self- Drive Vehicle Are Confused by Kangaroos

Volvo's self-drive system can identify and avoid deer, elk and caribou, but testing in Australia shows it cannot adjust to kangaroos.

2017-07-11

Ukrainian Security Call in FBI, NCA & Europol

Ukraine's SBU security service calls in international help & has branded the hugely damaging Petya attack an “act of cyber-terrorism”.

2017-07-10

Fraud And The Internet of Things

Cyber criminals have the funding and resources to infect millions of IoT gadgets with disruptive and potentially hazardous mechanisms.

2017-07-10

Trump’s Joint Cybersecurity Unit With Russia – It’s Not Happening

Reverse Gear: Plans for a joint cyber unit brought immediate ridicule amid concerns it was a Russian ruse to collect secrets.

2017-07-10

GCHQ Unveils Its Cybersecurity Playbook

The UK National Cyber Security Center has created four “simple and free measures” that public sector bodies can implement immediately.

2017-07-10

Prices For Stolen NSA Exploits Go Higher

Both Petya and Wannacry are strains of malware derived from NSA exploits stolen by the mysterious Shadow Brokers. Now they want more money.

2017-07-10

Fallout From Petya On Global Shipping

Petya shows the scale of the damage a computer virus can unleash on a technology dependent and inter-connected industry.

2017-07-07

India Wants A Big Windows Discount From Microsoft

75% Off: With 57 million computers in India, the country could save billions of dollars in costs if Microsoft agrees to the steep discount.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Miller Group

Miller Group

Miller Group is an IT managed service provider. We proactively monitor and manage your entire business computer network. Services include backup & recovery and cyber security.

Black Duck Software

Black Duck Software

Black Duck Hub allows organizations to manage open source code security as well as license compliance risks.

Verimatrix

Verimatrix

Verimatrix is a global provider of innovative cybersecurity solutions that protect content, devices, software and applications.

AntemetA

AntemetA

AntemetA specializes in network infrastructure, security and cloud computing, helping companies transform their Information Systems.

National Cyber Summit (NCS)

National Cyber Summit (NCS)

The National Cyber Summit is the preeminent event for cyber training, education and workforce development aimed at protecting our nation's infrastructure from the ever-evolving cyber threat.

Center for Long-Term Cybersecurity (CLTC)

Center for Long-Term Cybersecurity (CLTC)

The Center for Long-Term Cybersecurity is developing and shaping cybersecurity research and practice based on a long-term vision of the internet and its future.

Real Random

Real Random

Real Random is on a mission to enhance existing and new crypto-systems with its revolutionary solution to generating numbers that are Truly Random.

Elemendar

Elemendar

Elemendar Artificial Intelligence reads cyber threat reports written by humans and translates them into industry-standard, machine-readable and machine-actionable data.

Gluu

Gluu

Modern Authentication for Digital Enterprise. Organizations around the world trust Gluu for large-scale, high-security identity & access management.

Alcon Maddox

Alcon Maddox

Alcon Maddox is a niche recruitment and executive search firm specialised in sourcing exceptional Cyber Security sales and commercial leadership talent. Serving clients across the Middle East & Europe

Upfront Security

Upfront Security

Upfront Security helps companies with innovative products & services to prevent, recognise and recover from (identity) fraud.

IDECSI

IDECSI

IDECSI delivers cutting-edge technology and engages all employees in the security system for effective and cost-efficient data protection.

OxCyber

OxCyber

OxCyber's mission is to ignite and encourage cybersecurity and technology growth in the Thames Valley through meetings, webinars, in person events, workshops and mentorship programs.

AuthenticID

AuthenticID

Our mission at AuthenticID is to combat fraud worldwide and help businesses protect their enterprise and valuable data assets.

Black Duck Software

Black Duck Software

Black Duck (formerly the Synopsys Software Integrity Group) is the market leader in application security testing (AST).

Exaforce

Exaforce

At Exaforce, we are on a mission to 10× improve the productivity and efficacy of security and operations teams using our transformative multi-model AI engine.