NEWS > Cybersecurity News


« Back to News

2016-11-16

Cant Be Bothered: Non-Security Policy Used By 90% Of Workers

Most workers put convenience ahead of security policies, with 90% of them admitting to ignoring them when they feel they need to.

2016-11-14

Cyber Attack Takes Liberia’s Entire Internet Down

A cyber-attack knocked Liberia’s Internet offline, as hackers targeted the nation’s infrastructure using a mass DDOS technique.

2016-11-15

Jason Bourne: Envisioning A ‘frightening’ Cyberwar

Fact Or Fiction: Bourne's author “extrapolating” from his new thriller a “frightening” scenario of cyberwarfare that could inflict the real world.

2016-11-14

Company Directors Should Have Personal Liability For Data Breaches

The UK's Information Commissioner recommends government should hold company directors personally accountable for for data breaches.

2016-11-18

Self-drive Vehicles – A New Reality

There’s a powerful force behind the development of autonomous-vehicle technology. Armies around the world.

2016-11-18

Inside Anonymous - ‘Civil War’ Over Its Fight With ISIS

Hacktivist collective Anonymous cannot agree on strategy or tactics in it's self-appointed task of tackling IS Cyber Jihad.

2016-11-10

Cybercrime in Canada

Cybercrime is top of mind for many Canadian small and medium-sized businesses (SMBs).

2016-11-18

Bitcoin Just Isn’t Anonymous Enough

The anonymity of bitcoin has gained it many criminal users. Now, though, it's looking like the digital currency isn’t quite anonymous enough.

2016-11-10

US launches Code.gov Software Code-sharing Website

Code.gov, is a US government website for promoting the sharing of custom-developed software code.

2016-11-22

Artificial Intelligence: AI Fact & Fiction

Artificial intelligence is the science of making smart machines and it has come a long way since the term was coined in the 1950s. Good or bad?

2016-11-30

US Cybersecurity Strategy In The Trump Era

The Trump Administration has an opportunity to update US national security policies. What might they do differently for cybersecurity?

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Applause

Applause

Applause provides real-world software testing for functionality, usability, accessibility, load, localization and security.

Verifi

Verifi

Verifi is an award-winning provider of end-to-end payment protection and risk management solutions.

Wizlynx PTE LTD

Wizlynx PTE LTD

Wizlynx PTE LTD is the Singapore branch of Wizlynx Group located in Singapore, offering Information and Cyber Security Services throughout the entire Asia Pacific (APAC) region.

Assertion

Assertion

Assertion secures your collaboration (UC/CC) systems from cyber risks. Enforcing the right set of controls and monitoring them continually brings down risk to acceptable levels.

Southwest Research Institute (SwRI)

Southwest Research Institute (SwRI)

Southwest Research Institute SwRI are R&D problem solvers providing independent services to government and industry clients. Areas of expertise include Cybersecurity, Intelligent Networks and IoT.

Securis

Securis

Securis provides organizations and agencies with the highest level of professional, ultra-secure data destruction and IT recycling.

Smart Protection

Smart Protection

Smart Protection are experts in brand and trademark protection - we fight against counterfeits and unauthorized usages of brands with machine learning technology.

ZARIOT

ZARIOT

ZARIOT's mission is to restore order to what is becoming connected chaos in IoT by bringing unrivalled security, control and quality of service.

Conseal Security

Conseal Security

Mobile app security testing done well. Conseal Security are specialists in mobile app penetration testing. Our expert-led security analysis quickly finds security vulnerabilities in your apps.

Olympix

Olympix

Dev-first Web3 security that starts at the source. Olympix is a pioneering DevSecOps tool that puts security in the hands of the developer by proactively securing code from day one.

Panoplia Digital Protection

Panoplia Digital Protection

Panoplia Digital Protection is a cutting-edge cybersecurity company that leverages the power of AI and ML to help businesses and consumers protect themselves against cyber threats.

Token

Token

Token is changing the way our customers secure their organizations by providing passwordless, biometric, multifactor authentication.

Leapfrog Services

Leapfrog Services

Leapfrog offers outsourced managed IT + cybersecurity services that are scalable, aligned, and fit easily into your business model.

Straiker

Straiker

Straiker's AI-native security platform is designed to protect enterprise AI applications and autonomous agents from evolving threats through automated assessment and runtime guardrails.

Point3 Security

Point3 Security

Point3 Security is a premier information security organization that provides the industry with the talent screening and analytical tools to enhance its workforce.

Pillar Security

Pillar Security

Pillar Security are building the unified AI security platform to identify, assess, and mitigate security risks across your entire AI lifecycle.