NEWS > Cybersecurity News


« Back to News

2017-01-16

Police Connectivity: In-Car Video & Body Cameras

The ability of police systems to communicate with each other can result in better operational performance.

2017-01-13

AI and VR Are About To Transform Business

Artificial Intelligence & Virtual Reality are synonymous with gaming but they are going to change the way you communicate and do business.

2017-01-13

ISIS Just Can’t Resist Social Media

Social media is a key tool used by Jihadis to recruit followers, spread their radical interpretations of Islam and to promote outrage.

2017-01-13

Vladimir Putin & Donald Trump: Relationship Counselling

President-elect Trump is not yet in office and the allegations that President Putin interfered with the election in his favour are not going away.

2017-01-11

How AI Will Solve The Skills Shortage

Just as the Internet has revolutionised IT in the last 25 years, the current trajectory places AI squarely at the next technology inflection point.

2017-01-11

Russia Waging Cyberwar On Ukraine

Silent War: The Ukrainian President says Russian security services are waging a cyberwar against his country.

2017-01-11

Seamless Bio Electronic Devices

Bio Electronics: Harnessing biological rules to exchange information between the biochemistry of our bodies and the chemistry of our devices.

2017-01-11

The Digital Transformation Of The Humanitarian Sector

No industry is immune to being disrupted by technology. And that includes conflict and humanitarian relief. Opinion by Anje Kaspersen

2017-01-10

Surprise: Snowden Knows Some Russian Spies

Edward Snowden “has had and continues to have contact” with Russian intelligence services since arriving to safety in Moscow three years ago.

2017-01-10

Ransom Worm: The Next Level Of Cybersecurity

Holding your data hostage and seeking cash payment is bad enough. The next stage of ransomware is going to be even worse.

2017-01-10

Propaganda & Bias In Social Media News

The Fourth Industrial Revolution is beginning to pose some tough ethical questions. Can it be ensured that technology works for society?

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Zymr

Zymr

Zymr specialize in cloud computing solutions including Cloud Security, Cloud Mobility, Cloud Apps, Cloud Infrastructure and Cloud Orchestration.

CyberTrap

CyberTrap

CyberTrap is an advanced highly-interactive deception technology allowing real-time analysis and control of security breaches.

National Cyber Security Authority (NCA) - Saudi Arabia

National Cyber Security Authority (NCA) - Saudi Arabia

The NCA is the government entity in charge of cybersecurity in Saudi Arabia and serves as the national authority on its affairs.

Seconize

Seconize

Seconize empowers enterprises to proactively manage their cyber risks, prioritize remediations, optimize security spending and ensure compliance.

jobsDB.com

jobsDB.com

jobsDB Singapore is a search engine for jobs throughout Singapore.

ToucanX

ToucanX

ToucanX has eliminated remote attack vectors without sacrificing productivity. We’ve brought embedded near real time virtualization to the enterprise endpoint.

WebSec

WebSec

WebSec is a cybersecurity firm based in Amsterdam (NL) and Wyoming (US), specializing in offensive security services including penetration testing, red teaming, and tailored security assessments.

SoloKeys

SoloKeys

SoloKeys provides the first open-source FIDO2 security key: Protect your online accounts against unauthorized access by using the most secure login method.

CerraCap Ventures

CerraCap Ventures

CerraCap Ventures invest globally into early-stage B2B companies in Healthcare, Enterprise AI and Cyber Security.

Outseer

Outseer

Outseer is a leading technology company in the fight against payments fraud. Outseer reliably determines authentic customers from fraudulent behavior.

Dectar

Dectar

Dectar (formerly 4Securitas) is a cybersecurity company that provides solutions that predict, detect, defend and react against cybersecurity threats.

Venustech

Venustech

Venustech is a leading provider of network security products, trusted security management platforms, specialized security services and solutions.

DruvStar

DruvStar

DruvStar provides B2B cybersecurity around threat management to strengthen businesses across attack vectors.

CyFlare

CyFlare

CyFlare’s security platform integrates your tools with ours – delivering true positives, automated remediation, and interactive analytics built for security management teams.

Allure Security

Allure Security

Allure Security AI-driven brand protection scans more of the online world for faster, more accurate detection & removal of spoof websites, social media & mobile apps -- before customers fall victim.

GMO Cyber Security

GMO Cyber Security

GMO Cyber Security is an information security company that focuses mainly on vulnerability diagnosis. It is Japan's leading white hat hacker organisation.