NEWS > Cybersecurity News


« Back to News

2017-02-15

WikiLeaks Wants A Database To Verify Twitter Users

After years of campaigning for transparency WikiLeaks now says it wants to build a surveillance database of it's own.

2017-02-15

Protecting Employees From Data Breaches

Businesses need to ramp up security, training, response and insurance tactics to respond to the insider threat of compromised employees.

2017-02-14

Non-Secure IoT Devices Are Powerful Weapons

The experts at ICIT think the future of IoT devices needs to be secured by designing in and embedding security features from the bottom up.

2017-02-14

Stolen Health Records Flooding Dark Web Markets

The large amount of stolen patient data posted for sale to the dark web in recent months has caused prices for most of those records to drop.

2017-02-13

Give Children More Control Of Data Privacy

The UK’s Children’s Commissioner is calling for stronger privacy settings for youngsters, amid fears their personal information is being exploited.

2017-02-13

Is The World On The Verge Of A Cyber War?

Some experts say a combination of geopolitical and strategic circumstances is leading to an inevitable State vs. State conflict in cyberspace.

2017-02-13

BYOD Security Is Critical For Business

The prevalence of bring-your-own-device culture in the corporate world means workers can be more productive & connected. More vulnerable, too.

2017-02-08

Tech Billionaires Give $20m For Artificial Intelligence Research

The founders of LinkedIn and eBay are donating a combined $20m to fund academic research aimed at ensuring the safety of AI.

2017-02-06

DARPA Working On Secure Data Sharing

DARPA is kicking off a project to create a new way to enable US troopsto securely send and receive sensitive information on their devices.

2017-02-08

Cyber Security Protection For Business

From encouraging a culture of caution, to backing up files, here's how SMEs can defend themselves against hacking threats.

2017-02-07

Botnets Have Infiltrated The Twitterverse

Twitter bots produce spam, provide fake followers and can manipulate debates and public opinion in insidious ways that are hard to track and prevent.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

TrustedIA

TrustedIA

TrustedIA is a cyber and protective security company. Our mission is to help businesses protect themselves from disruptive events that can impact their successful operation.

Bromium

Bromium

Bromium deliver a new technology called micro-virtualization to address the enterprise security problem and provide protection for end users against advanced malware.

MarQuest

MarQuest

MarQuest provides services and systems to enhance network reliability and security.

Covenco

Covenco

Covenco is a data management and IT infrastructure specialist. Working with customers to transform their IT environments, with data protection and security at the forefront of everything we do.

Visa

Visa

Visa is a global payments technology company that connects consumers, businesses and banks in more than 200 countries and territories worldwide.

Hacker House

Hacker House

Hacker House teaches you what hackers can learn about your business and systems so that preventative solutions to protect your assets can be applied through active measures.

ATIA

ATIA

ATIA provides consulting services in the design and implementation of IT system, Information Security, ISO certification, and professional IT training and education.

Quantea

Quantea

Our multi-patented solutions - QP Series Network Analytics Accelerator appliance and PureInsight Analytics Software Suite allows you to capture, analyze, store, replay, network traffic data.

IFE Digital Systems

IFE Digital Systems

IFE Digital Systems conducts research, development and consultancy in risk, safety and security related to digital systems in critical infrastructure.

Passbase

Passbase

Passbase is building a full-stack identity verification engine backed by verified government documents.

Black Hills Information Security (BHIS)

Black Hills Information Security (BHIS)

Black Hills Information Security provide security testing and vulnerability assessment services.

Technology Innovation & Startup Centre (TISC)

Technology Innovation & Startup Centre (TISC)

TISC is a startup incubator at the Indian Institute of Technology Jodhpur (IITJ) and we back deep-tech startups.

Kape Technologies

Kape Technologies

Kape Technologies is a cybersecurity company focused on helping consumers around the world have a better digital experience with greater privacy and protection.

Brace168

Brace168

Specialising in Cyber Security incident identification and response, Brace168 is uniquely positioned to provide a vast experience in managed security services to meet the needs of all business types.

LimaCharlie

LimaCharlie

LimaCharlie gives security teams full control over how they manage their security infrastructure. Get full visibility, build what you want, control your data, get the security capabilities you need.

Babble

Babble

Babble is a Unified Comms, Contact Centre and Cyber Solutions provider. We believe in making next-generation technology simple to use, deploy and manage.