NEWS > Cybersecurity News


« Back to News

2017-06-20

WikiLeaks Releases More Info On CIA Malware

Codenamed Pandemic, this ingenious CIA tool targets computers with shared folders, from where users can download files via SMB.

2017-06-26

Canada Prioritizes Cyber-Attack

Canadian defence forces will be asked to do more to battle cyber threats and take a larger role in drone warfare.

2017-06-22

Impact Of AI On UK Jobs Divides Opinion

BT say that IT decision makers are divided about the impact of disruptive technologies including AI and automation on the UK labour market.

2017-06-20

WannaCry Prompts Microsoft Updates … And A Warning

Microsoft has released new security updates for older versions of Windows as it warns of potential cyber-attacks by government organisations.

2017-06-20

US Presidential Election Hacks Revealed

The NSA say that Russian hacking efforts around the US presidential election were much broader & more pervasive than originally known.

2017-06-19

US Blames North Korea For Hacking

Finally: The US government has issued a rare alert squarely blaming North Korean for a raft of cyber-attacks stretching back to 2009.

2017-06-19

Machine Learning Writes Better Emails

Hierarchical Models Of Language: Google is introducing an enhanced version of its “smart reply” machine-learning email software.

2017-06-19

Israeli Hackers Have Penetrated ISIS Networks

Israeli hackers have uncovered the terror group's plans to build laptop bombs that could get through airport X-ray machines.

2017-06-16

Healthcare Sector Accounts For 43% Of UK Data Breaches

UK Information Commissioner data shows that healthcare organisations were consistently top of the list for data breach incidents 2014 - 2016.

2017-06-15

Australia Implements Mandatory Data Breach Reporting

The new regime will apply to all Australian public sector agencies plus private sector and not-for-profit organisations with annual sales over A$3m.

2017-06-14

UK SMEs Don’t Have Cybersecurity Recovery Plans

With GDPR rules coming into force in less than a year nearly half of UK small businesses don’t have a cyber security plan for their business.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Protective Intelligence

Protective Intelligence

Protective Intelligence brings together a group of information security specialists with a passion for delivering high-quality solutions.

Council on Foreign Relations (CFR)

Council on Foreign Relations (CFR)

CFR is dedicated to better understanding the world and the foreign policy choices facing the USA and other countries. Cyber security is covered within the CFR topic areas.

Security Current

Security Current

Security Current's proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.

Intrinsic-ID

Intrinsic-ID

Intrinsic-ID's authentication technology creates unique IDs and keys to authenticate chips, data, devices and systems.

CSIRT Malta

CSIRT Malta

CSIRT Malta supports critical infrastructure organisations in Malta on how to protect their information infrastructure assets and systems from cyber threats and incidents.

EdgeWave

EdgeWave

EdgeWave provides simple but highly effective data security and advanced threat protection in solutions that are affordable, scalable and easy to use.

Wallarm

Wallarm

Wallarm is the only unified, best-in-class API Security and WAAP (Web App and API Protection) platform to protect your entire API and web application portfolio.

MACH37

MACH37

MACH37 is a market-centric cybersecurity accelerator program designed to facilitate the creation of the next generation of cybersecurity product companies.

CopSonic

CopSonic

Copsonic provide a technology solution based on ultrasonic waves to send secure and encrypted data between two devices in order to achieve authentication.

Calyptix Security

Calyptix Security

Calyptix Security helps small and medium offices secure their networks so they can raise profits, protect investments, and control technology.

Private Machines

Private Machines

Private Machines develops unique patent-pending technology protects cloud and data center workloads.

StoneLock

StoneLock

StoneLock is a trusted leader in the design and manufacture of facial recognition software and technology.

NWN Carousel

NWN Carousel

NWN Carousel delivers AI-powered technology solutions for the modern workplace. From unified communications and intelligent infrastructure to robust cybersecurity.

StealthMole

StealthMole

StealthMole is a deep and dark web threat intelligence company that delivers a cloud-based, unified platform for digital investigation, risk assessment, and threat monitoring.

5S Technologies

5S Technologies

5S Technologies is a regional IT solutions and services provider based in Cary, NC and serving the Carolinas.

IntelliBridge

IntelliBridge

IntelliBridge supports our nation’s most critical missions by solving complex technology, intelligence, and mission support challenges.