NEWS > Cybersecurity News


« Back to News

2017-06-02

Ignoring Software Updates…

Failing to update leaves your devices vulnerable to attack. Configuring automatic updates from trusted providers makes sure these are installed regularly.

2017-06-02

Eight Steps To The GDPR Countdown

GDPR will dramatically affect how businesses work with the personal data of citizens and residents of the European Union.

2017-06-02

Russian Hackers Sow Disinformation Via Leaks

Russian hackers alter documents within those releases of hacked material, planting disinformation alongside legitimate leaks.

2017-06-02

WannaCry Outbreak Is Just A Tip Of An Iceberg

While WannaCry mostly hit business and government systems, the next targets could be private homes.

2017-06-02

Mystery British Airways IT Failure

Experts have questioned British Airways’ claim that this weekend’s catastrophic IT failure was down to a “power surge”

2017-05-31

Algorithms: An Unseen Influence On The UK Election

Social media, Facebook in particular, will have an enormous effect on the UK vote, yet no-one seems to know how to measure what’s happening there.

2017-05-31

EU’s New Data Rules Are 1 Year Away

May 25 2018 is a date that should be etched in red on the calendar of any company that does business in the European Union

2017-05-31

Current Cybercrime Threats Originate In Espionage

Spy agencies like the US National Security Agency hoard weapons that, by their very nature, target civilian infrastructure.

2017-05-28

Mathematical Analysis Suggests Marlowe And Shakespeare Co-Wrote

Computerised textual analysis is now so sophisticated that it can distinguish between Shakespeare writing like Marlowe and Marlowe alone.

2017-05-30

Eight Steps For Cloud Security

Migrating corporate data to the cloud is really just a form outsourcing and testing the service provider's security means asking some hard questions.

2017-05-30

WannaCry Also Hit Windows 7 Systems

Not just unsupported networks running Windows XP were affected. Untpatched Windows 7 users also suffered from the attack.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Information Security Research Group - University of South Wales

Information Security Research Group - University of South Wales

The Information Security Research Group has an international reputation in the areas of network security, computer forensics and threat analysis.

SiteGuarding

SiteGuarding

SiteGuarding provide website security tools and services to protect your website against malware and hacker exploits.

Identity Automation

Identity Automation

Identity Automation is a leading provider of Identity and Access Management software.

Potomac Institute for Policy Studies

Potomac Institute for Policy Studies

Potomac Institute undertakes research on key science, technology, and national security issues facing society, Study areas include cybersecurity.

Luxembourg Institute of Science & Technology (LIST)

Luxembourg Institute of Science & Technology (LIST)

LIST is a mission-driven Research and Technology Organisation. Areas of research include IT and aspects of IT security.

360 Total Security

360 Total Security

360 company is the largest provider of Internet and mobile security products in China.

Inavate Consulting

Inavate Consulting

Inavate Consulting are experts in defining and implementing information assurance solutions and governance frameworks. Our ISO27001 consultants are the most experienced in the industry.

Check Point SASE

Check Point SASE

Check Point SASE (formerly Perimeter 81) is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Duality Technologies

Duality Technologies

Duality Technologies combine Advanced Cryptography with Data Science to deliver High-Performance Privacy-Protecting Computing to Regulated Industries.

SIRP Labs

SIRP Labs

SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response.

Internet Security Research Group (ISRG)

Internet Security Research Group (ISRG)

ISRG's mission is to reduce financial, technological, and educational barriers to secure communication over the Internet.

BAE Systems

BAE Systems

BAE Systems develop, engineer, manufacture, and support products and systems to deliver military capability, protect national security, and keep critical information and infrastructure secure.

Circle Security

Circle Security

Circle’s breakthrough security API unifies solutions for identity and data security into one architecture and empowers organizations to secure their identity, data and privacy in their applications.

Triskele Labs

Triskele Labs

Triskele Labs deliver services including Penetration Testing, Compliance and Risk Management through to 24*7*365 Security Operations and outsourced Cybersecurity Managers.

Forensic IT

Forensic IT

Forensic IT is a specialised cyber security firm with expertise in Digital Forensics and Incident Response (DFIR).

Clumio

Clumio

Clumio provides autonomous backup and recovery for critical cloud data.