NEWS > Cybersecurity News


« Back to News

2017-02-13

BYOD Security Is Critical For Business

The prevalence of bring-your-own-device culture in the corporate world means workers can be more productive & connected. More vulnerable, too.

2017-02-08

Tech Billionaires Give $20m For Artificial Intelligence Research

The founders of LinkedIn and eBay are donating a combined $20m to fund academic research aimed at ensuring the safety of AI.

2017-02-06

DARPA Working On Secure Data Sharing

DARPA is kicking off a project to create a new way to enable US troopsto securely send and receive sensitive information on their devices.

2017-02-08

Cyber Security Protection For Business

From encouraging a culture of caution, to backing up files, here's how SMEs can defend themselves against hacking threats.

2017-02-07

Botnets Have Infiltrated The Twitterverse

Twitter bots produce spam, provide fake followers and can manipulate debates and public opinion in insidious ways that are hard to track and prevent.

2017-02-07

Lloyds Bank Cyber Attack

Following a massive DDoS attack affecting millions of customers, Lloyds Bank have sought help from the UK National Cyber Security Centre.

2017-02-07

Russia’s Attack On Web Freedom

Safe in Moscow, Edward Snowden has said very little about the Russian security apparatus, which is more intrusive than that in Europe & the USA.

2017-02-07

US And UK Agree To Take On Islamic State In Cyberspace

Trump & May: 'Deepening intelligence and security cooperation and critically.. stepping up efforts to counter Daesh in cyberspace.'

2017-02-06

'Locked-in' Patients Enabled To Communicate

A brain-computer interface can read the thoughts of patients suffering Locked-In syndrome to answer simple yes-or-no questions.

2017-02-03

Big Data Analysis – Now Used For Politics…

Big data analysis has not only been contributing to decision making in the realms of business, health, and defense, but also in politics.

2017-02-03

Why Are Hackers After Healthcare Records?

Information hacked from a Financial Institution or Bank is quickly rendered useless. Classified Healthcare data has continued value lasting a lifetime.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Grid32

Grid32

Grid32 provides independent computer system and physical security audit services to government and corporate clients of all sizes.

Picasso

Picasso

The Picasso project is focused on ICT Policy, Research and Innovation for a Smart Society: towards new avenues in EU-US ICT collaboration.

ecsec

ecsec

ecsec is a specialized vendor of security solutions including information security management, smart card technology, identity management, cloud computing and electronic signature technology.

iONLINE

iONLINE

iONLINE delivers high quality IT services and solutions to businesses in Azerbaijan.

AlAnsari Technical Solutions (ATS)

AlAnsari Technical Solutions (ATS)

ATS is a Kuwait based company specialised in delivering hardware/software, Virtualisation, IP Telephony / Unified Communication, Networking and professional IT services and solutions.

SGBox

SGBox

SGBox is a highly flexible and scalable solution for IT security. Choose the modules which your company needs and implement it without any modification to your network infrastructure.

CYBAVO

CYBAVO

CYBAVO is a cryptocurrency security company founded by experts from the cryptocurrency and security industries.

Global EPIC

Global EPIC

Global EPIC is an international cybersecurity initiative designed to combat growing world challenges by facilitating global collaboration in the field of cyber security.

AUTOCRYPT

AUTOCRYPT

AUTOCRYPT is a mobility security provider dedicated to the safety of future transportation

Cybaverse

Cybaverse

Cybaverse (formerly North Star Cyber Security) was founded to create the perfect blend of a Managed Security Service Provider (MSSP) and a Cyber Security Consultancy in one.

Legit Security

Legit Security

Legit Security's mission is to secure every organization's software factory by protecting the pipelines, infrastructure, code and people for faster and more secure software releases.

MiDO Technologies

MiDO Technologies

MiDO Technologies has a mission to change the narrative around digital enabling tools on the continent of Africa and prepare African youth.

Disecto Technologies

Disecto Technologies

At Disecto, we provide SaaS based Data Discovery, Classification and a remediation solution for data privacy compliance.

Pulsar Security

Pulsar Security

Pulsar Security is a team of highly skilled, offensive cybersecurity professionals with the industry's most esteemed credentials and advanced real-world experience.

Trustmi

Trustmi

Trustmi is a leading fintech cybersecurity solution designed to prevent financial losses from fraud and errors, 24/7.

RedSense

RedSense

RedSense provides industry-leading threat intelligence services, adversary space interaction & monitoring, net flow monitoring and interpretation for our clients.