NEWS > Cybersecurity News


« Back to News

2017-01-18

Drone Warriors Of The US Air Force

Leaving Las Vegas & Commuting To The Warzone: US Air Force drone piots lead a strange double life.

2017-01-17

It Was Not All Bad News In 2016

Last year saw major advances in a number of key technologies: AI, Quantum Computing, Drones, Data Transmission Speeds & Exoskeletons.

2017-01-23

The Swedish Kings of Cyberwar

Forget GCHQ. The Swedish National Radio Defence Intelligence Agency has some remarkable technical capabilities.

2017-01-18

Rome: Cyber Spying Rings Security Bells

The President of the European Central Bank and former Italian prime minister, Matteo Renzi are targets of a cyber spying & hacking operation.

2017-01-18

Hackers Target France’s Presidential Election

After witnessing cyberattacks on the US Presidential election, France is leaving no stone unturned to protect its own election from hackers.

2017-01-18

2017 Tech Trends: 'A Major Bank Will Fail'

Security experts expect some major events in 2017, including a cybersecurity lapse that will bring down a big financial institution.

2017-01-17

Watson For Cybersecurity

IBM has announced that 40 companies around the world have signed up for it's Watson Beta Cybersecurity Program.

2017-01-16

Changing Other People's Flight Bookings Is Just Too Easy

The travel booking systems used by millions of people every day are woefully insecure and lack modern authentication methods.

2017-01-16

America’s Cyber Security Dilemma

Unintended Consequence: Is US military spending driving adversaries towards cheaper, cyber-focused means of response?

2017-01-16

German Police Will Squash Fake Online News

Pure Fiction: Combining exaggerated and unconnected incidents to create a picture of chaos and of foreigners promoting terrorism.

2017-01-16

Five Cybersecurity Predictions for 2017

The enterprise security Ninjas at Tanium list their top five predictions for cybersecurity in the year ahead.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Privacy Professor

Privacy Professor

Privacy Professor provides information privacy, security and compliance services, tools and products to organizations in a wide range of industries.

Team Cymru Research NFP

Team Cymru Research NFP

Team Cymru Research is a group of technologists passionate about making the Internet more secure and dedicated to that goal.

NICE Systems

NICE Systems

NICE Systems provide software solutions to ensure compliance, fight financial crime, and safeguard people and assets.

ABL Cyber Academy

ABL Cyber Academy

ABL provide certified training courses in the field of cyber security and IT project management.

ClearDATA

ClearDATA

The ClearDATA Managed Cloud protects sensitive healthcare data using purpose-built DevOps automation, compliance and security safeguards, and healthcare expertise.

GuardiCore

GuardiCore

GuardiCore is an innovator in internal data center security and breach detection and is transforming security inside data centers and clouds.

SMESEC

SMESEC

SMESEC is a lightweight Cybersecurity framework for protecting small and medium-sized enterprises (SME) against Cyber threats.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

TechStak

TechStak

TechStak is the easiest way for businesses to find and connect with IT Pros and other technology solution providers in their area.

Intracom Telecom

Intracom Telecom

Intracom Telecom is a global telecommunication systems & solutions vendor offering a complete range of professional services and solutions including Information Security.

Xceptional

Xceptional

Xceptional is a multi-award-winning technology services firm that celebrates the unique strengths of people with autism.

Turngate

Turngate

Turngate simplify security investigations so you can see employee activities and entitlements in your enterprise in seconds.

Fusion5

Fusion5

Fusion5 is a leading ANZ Business Services and IT Solutions provider. Our customers trust us to make their potential reality by providing advisory, IT project deployment, and managed services.

Xiphera

Xiphera

Xiphera designs and implements proven cryptographic security for embedded systems.

Skylark

Skylark

Skylark is a leading global IT services provider, transforming client’s businesses through innovative and advanced technology solutions.

CQR

CQR

CQR are at the forefront of innovative cyber solutions, dedicated to securing and fortifying Operational technology (OT) infrastructure.