NEWS > Cybersecurity News


« Back to News

2016-11-10

Australian Government Networks Hacked

Australian government networks are clearly at high risk of cyber-attacks following a sequence of high profile hacks.

2016-11-08

Cyber Strikeback: Putin’s Aide Hacked

Retaliation? Secret correspondence belonging to a top aide to Russian President Vladimir Putin hacked and leaked.

2016-11-13

Is Apple Abandoning Macs?

Apple has neglected its Mac line in favour of other devices, leaving the Apple faithful wondering if the company is still committed to it?

2016-11-08

Otto's Self-driving Truck Delivers Its First Payload

For those doubting that autonomous vehicles are going to be driving alongside humans very soon, consider the first goods delivery made by Otto.

2016-11-14

Connected-Cars Could Cost Your Privacy

Connected cars are poised to become one of the biggest changes in the driving experience since the invention of the automobile.

2016-11-09

Was North Korea Behind The IoT DDoS Attack?

Multiple big-name sites, including Twitter, Spotify and GitHub, experienced slowdowns in an attack against DNS services took shape.Was it N. Korea?

2016-11-08

Where The Money Is: Bank Robbers Blow Up 492 ATMs

Some 492 ATMs across Europe were blown up by thieves in the first half of 2016, as more criminals attempt to infiltrate bank machines via cyber-attacks.

2016-10-31

ISIS Social Media Ops Are Declining

The war against the Islamic State seems to have hit a turning point, both on the battlefield and on social media.

2016-10-31

Decrypting the Dark Web

Data analysis can highlight the trends in communication between bad actors who gather in underground forums across the Dark Web.

2016-10-31

Future Of Security: Connect Cyber With Physical Defence

With more items gaining web connectivity as part of the IoT trend, organisations cannot afford to separate physical security from cybersecurity.

2016-10-31

2016 Trends in Cyber Crime

According to Europol, the volume, scope and cost of Cybercrime have reached very high levels, and are set to get even higher.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT GRC Forum

IT GRC Forum

The IT GRC Forum is an online resource and networking platform for the Governance, Risk Management, and Compliance (GRC) community

Council on Foreign Relations (CFR)

Council on Foreign Relations (CFR)

CFR is dedicated to better understanding the world and the foreign policy choices facing the USA and other countries. Cyber security is covered within the CFR topic areas.

Superscript

Superscript

Superscript (formerly Digital Risks) is an insurance broker for small businesses, sole-traders, landlords and high-growth tech firms. Our services include Cyber Liability insurance.

Kramer Levin

Kramer Levin

Kramer Levin is a full-service law firm with offices in New York and Paris. Practice areas include Cybersecurity, Privacy and Data Protection.

Bundesdruckerei

Bundesdruckerei

Bundesdruckerei specializes in secure identity technologies and services for protecting sensitive data, communications and infrastructures.

Packet Ninjas

Packet Ninjas

Packet Ninjas is a niche cyber security agency with specialized expertise in the use of digital intelligence to strengthen cyber security.

Muninn

Muninn

At Muninn (aka Wehowsky), we specialize in mitigating potential risks within your network, providing one of the leading network detection and response (NDR) solutions on the market.

ECHO Project

ECHO Project

The main objective of ECHO is to strengthen the cyber defence of the European Union, enhancing Europe’s technological sovereignty through effective and efficient multi-sector collaboration.

BlackFog

BlackFog

BlackFog is a leader in device data privacy, data security and ransomware prevention. Our behavioral analysis and anti data exfiltration technology stops hackers before they even get started.

Arcturus Security

Arcturus Security

Arcturus is a CREST-approved cyber security consultancy created by experts in the field.

Trusted Security Solutions (TSS)

Trusted Security Solutions (TSS)

TSS are specialist in IT Security and providing Cybersecurity Solutions & Services combined with storage and backup.

Strata Identity

Strata Identity

Strata is pioneering identity orchestration to unify on-premises and cloud-based authentication and access systems for consistent identity management in multi-cloud environments.

LAVAAT

LAVAAT

At LAAVAT, our goal is to make it easy for our customers to build secure IoT devices without a need to invest considerably in embedded security and cryptography expertise.

Bosch Global Software Technologies (BGSW)

Bosch Global Software Technologies (BGSW)

Bosch Global Software Technologies offer an advanced innovation for AI security. The Bosch AIShield is the definite answer to safeguard your business against model extraction attacks.

IT Solutions Consulting

IT Solutions Consulting

IT Solutions is a full-service IT partner providing managed services and other information technology solutions nationwide.

Southern Cyber

Southern Cyber

At Southern Cyber, our mission is to deliver world-class information security solutions that align businesses with leading security frameworks and compliance standards.