NEWS > Cybersecurity News


« Back to News

2017-06-02

Mystery British Airways IT Failure

Experts have questioned British Airways’ claim that this weekend’s catastrophic IT failure was down to a “power surge”

2017-05-31

Algorithms: An Unseen Influence On The UK Election

Social media, Facebook in particular, will have an enormous effect on the UK vote, yet no-one seems to know how to measure what’s happening there.

2017-05-31

EU’s New Data Rules Are 1 Year Away

May 25 2018 is a date that should be etched in red on the calendar of any company that does business in the European Union

2017-05-31

Current Cybercrime Threats Originate In Espionage

Spy agencies like the US National Security Agency hoard weapons that, by their very nature, target civilian infrastructure.

2017-05-28

Mathematical Analysis Suggests Marlowe And Shakespeare Co-Wrote

Computerised textual analysis is now so sophisticated that it can distinguish between Shakespeare writing like Marlowe and Marlowe alone.

2017-05-30

Eight Steps For Cloud Security

Migrating corporate data to the cloud is really just a form outsourcing and testing the service provider's security means asking some hard questions.

2017-05-30

WannaCry Also Hit Windows 7 Systems

Not just unsupported networks running Windows XP were affected. Untpatched Windows 7 users also suffered from the attack.

2017-05-30

Making Sense Of Dark Data

Using AI to analyse the vast amounts of unstructured digital data being generated looks like a growth business. Apple is investing.

2017-05-30

Crimes Of The Future Will Be Solved Using IT, Robot CSIs, Smell & VR

Smell. Sound. Digital Reconstruction: Crime scene investigators will soon be using a raft of new tools & analytical techniques.

2017-05-30

Electronic Warfare Development Rate

The US wants to provide NATO soldiers the ability to understand the electromagnetic spectrum they find themselves in on the battlefield.

2017-05-26

North Korea's Unit 180 Managed WannaCry Attack

Symantec says a hacking group closely tied to North Korea was behind the massive WannaCry attack hitting 200,000 plus computers in 150 countries.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

TestFort

TestFort

TestFort QA Lab is a specialized software testing company offering independent quality assurance and software testing services.

Trinexia

Trinexia

Trinexia (formerly Credence Security) is a specialty Value-added Distributor of Cyber Security, Digital Forensics, Security Awareness, Data Security & Governance solutions.

Pathway Forensics

Pathway Forensics

Pathway Forensics is a leading provider of computer forensics, e-discovery services and digital investigations.

National Cybersecurity Hub - South Africa

National Cybersecurity Hub - South Africa

The mission of the National Cybersecurity Hub is to be the central point of collaboration for cybersecurity incidents in South Africa.

SAST

SAST

SAST provide Static Application Security Testing as a service based on SAST Tools.

ActiveNav

ActiveNav

ActiveNav provide dark data discovery solutions for compliance and information governance.

DataDog

DataDog

DataDog provides Cloud-native Security Monitoring. Real-time threat detection across your applications, network, and infrastructure.

DeepSeas

DeepSeas

DeepSeas is the result of a merger between Security On-Demand (SOD) and the commercial Managed Threat Services (MTS) business of Booz Allen Hamilton.

Soliton

Soliton

Soliton is a leading Japanese technology company and a pioneer in IT security solutions for protecting company resources and data from external IT security threats.

CWSI

CWSI

CWSI provide a full suite of enterprise mobility, security and productivity solutions to many of Ireland and the UK’s most respected organisations across a wide range of industry and public sectors.

International College For Security Studies (ICSS)

International College For Security Studies (ICSS)

ICSS India offers technical education to students, clients and partners in IT Industry by our well qualified, certified and experienced trainers.

VC3

VC3

VC3 provides a full range of Information Technology Solutions and Services to hundreds of municipalities and organizations throughout the USA.

Resilience Cyber insurance

Resilience Cyber insurance

Resilience helps to improve cyber resilience by connecting cyber insurance coverage with advanced cybersecurity visibility and a shared plan to reinforce great cyber hygiene.

ITC Federal

ITC Federal

ITC Federal delivers IT cybersecurity assessment services to support agencies in meeting their security strategies and federal security compliance goals.

Synagex

Synagex

Synagex Modern IT is a simple IT and cybersecurity solution for businesses.

Cipher Net Shield

Cipher Net Shield

Cipher Net Shield specializes in secure E-wallet solutions with a strong focus on blockchain and cybersecurity, prioritizing both transaction security and the recovery of lost capital.