NEWS > Cybersecurity News


« Back to News

2017-05-12

Cyber Spies Go Mainstream

Cyber espionage appears to have hit the mainstream as the most popular attack method in the public sector, education & manufacturing industries.

2017-05-12

Macron Hackers Linked To Russian Intelligence

President Macron's campaign team used some effective countermeasures to diminish the impact of a stolen data dump on their candidate.

2017-05-12

Cybersecurity Has A Metrics Problem

Building security metrics, measuring risk and improving cyber incident communications in your organisation aren’t “one and done” processes.

2017-05-11

NATO Cyber War Games 2017: Czechs Win

The Czech team won Locked Shields, NATO's international live-fire cyber defence exercise.The US Team were only midfield.

2017-05-10

The Cybersecurity Threats That Keep Banks Alert

People in charge of vast volumes of valuable financial data are under increasing pressure to keep customer data safe from hackers & fraudsters.

2017-05-10

Malware: Eyes On North Korea

KONNI malware allows the operator to steal files, keystrokes, perform screenshots and execute arbitrary code on the infected host.

2017-05-10

Thieves Drain Protected Bank Accounts

A known security hole in the networking protocol used by mobile phone providers enabled a string of attacks that emptied bank customer accounts.

2017-05-05

Major Cyber-Attack Prevented

Israel’s National Cyber Defence Authority has revealed that it successfully prevented a major cyber-attack on 120 private & public institutions.

2017-05-04

Getting Intelligence Agencies To Adapt To Life Out Of The Shadows

Gone are the days when spy agencies did not officially exist and their personnel & activities were hidden away from public view. By Jamie Collier

2017-05-04

Hackers Could Turn Off Your Car Engine – While You Are Driving

Bosch’s Drivelog Connect product, which enables you to monitor your car’s performance from your smartphone, can be exploited by hackers.

2017-05-03

Cardiff Cyber Security Research Centre - 'first in Europe'

A new UK research centre to tackle cyber-attacks, protect corporate IT networks. IP and critical infrastructure has opened in Cardiff.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

authen2cate

authen2cate

Authen2cate offers a simple way to provide application access with our Identity and Access Management (IAM) solutions for enterprise, small business, and individual customers alike.

Information Security Media Group (ISMG)

Information Security Media Group (ISMG)

Information Security Media Group is the world’s largest media organization devoted solely to information security and risk management.

edgescan

edgescan

edgescan is a cloud-based continuous vulnerability management and penetration testing solution.

Fox-IT

Fox-IT

Fox-IT prevents, solves and mitigates the most serious cyber threats with smart solutions for governmental bodies, defense, law enforcement, critical infrastructure, banking and large enterprises.

SteelCloud

SteelCloud

SteelCloud has spent the last decade inventing technology to automate policy compliance, configuration control, and Cloud security.

German Accelerator

German Accelerator

German Accelerator supports high-potential German startups in successfully entering the U.S. and Southeast Asian markets.

IntelligInts

IntelligInts

IntelligInts provide 24×7 threat monitoring, hunting, alerting, and mitigation in our world class Security Operations Center.

SterlingRisk Programs

SterlingRisk Programs

SterlingRisk’s Cyber practice brings experience working with a wide array of clients across a broad spectrum of industries.

SK Shieldus

SK Shieldus

SK shieldus are a converged security provider with business capabilities in both cybersecurity and physical security based on Big-Tech.

Privacy Compliance Hub

Privacy Compliance Hub

Privacy Compliance Hub provide an easy to use platform with a comprehensive data protection compliance programme including training, information, templates and reporting.

TuxCare

TuxCare

TuxCare make Linux more secure. We take care of Linux so that organizations can use Linux to support environments that require high levels of Cybersecurity, stability, and availability.

TOTM Technologies

TOTM Technologies

TOTM Technologies provides end-to-end identity management and biometrics products, powering Digital identity and Digital onboarding solutions.

Myntex

Myntex

Myntex® builds the future of mobile security. We empower our partners to deliver exclusive mobile endpoint security software, fortifying against mobile threats, device exploits and data exfiltration.

Var Group

Var Group

Var Group is one of the main partners for innovation in the ICT sector in Italy.

Odaseva

Odaseva

Odaseva delivers the strongest data security solution for enterprises running on Salesforce, safeguarding confidentiality and integrity of critical business information.

SysGroup

SysGroup

SysGroup is an award-winning managed IT services, cloud hosting, and IT consultancy provider.