NEWS > Cybersecurity News


« Back to News

2016-09-14

IBM’s Watson Takes Aim At CyberSecurity

IBM has launched a new cloud-based version of the company’s cognitive technology to tackle the rising challenge of cyber security.

2016-09-08

Hong Kong Hacked

Two Hong Hong government agencies have come under attack from cyber-spies originating in China.

2016-09-14

Cybercrime & Cyberwar: A Spotter's Guide

Cybercriminals are as varied as other Internet users: They have different tools, objectives & specialties. Understanding them can defend against them.

2016-09-10

Critical Infrastructure Is The Next Target

The way we think about cyber-attacks changed when Ukraine experienced the first recorded power outage caused by a cyber-attack.

2016-09-13

Canadian Companies Vulnerable To Cyber-Attacks

Canadian organizations aren’t prepared for the rising caliber of attacks, according to Deloitte’s 2015 cyber security survey.

2016-09-17

Australian Government Networks Hacked

Sensitive Australian Government and corporate computer networks have been penetrated by sophisticated cyber-attacks.

2016-09-19

UAE Using Israeli Spy Technology

The United Arab Emirates uses Israeli malware capable of turning Apple’s iPhones into remote spying devices to clamp down voices of dissent.

2016-09-09

Are US Voting Machines Secure From Hackers?

Some states have declined to scan voting systems for hackers ahead of the presidential US elections.

2016-09-08

Islamic State Members Embedded In Government

The Kuwaiti interior ministry has arrested a governmental insider for hacking the official websites and spreading the IS propaganda.

2016-09-09

Cyber Vulnerability Identified In Major Weapons Systems

The US Pentagon is worried about uncovering cyber flaws in it's strategic weapons systems.

2016-09-21

Who Are We In the Cyber World?

Reading List: Mary Aiken's book 'The Cyber Effect' is about how the Internet is shaping development, behavior and our perception of the world.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MobileIron

MobileIron

MobileIron provides EMM capabilities to IT organizations that need to secure mobile devices, applications and content.

MyCERT

MyCERT

MyCERT is the National Computer Emergency Response Team of Malaysia.

Advanced Software Products Group (ASPG)

Advanced Software Products Group (ASPG)

ASPG offers a wide range of innovative mainframe software solutions for Data Security, Access Management, System Management and CICS productivity.

Nation-E

Nation-E

Nation-E offers innovative cyber security solutions for industrial installations, critical infrastructure and smart grids.

Information System Authority (RIA) - Estonia

Information System Authority (RIA) - Estonia

RIA ensures the interoperability of the state’s information system, organises activities related to information security, and handles security incidents in Estonian computer networks.

SHIELD

SHIELD

SHIELD is an established end-to-end fraud management solution that blocks fraudulent activities such as account takeovers, fake accounts creation, fraudulent payments, loyalty fraud and more.

Trinity Cyber

Trinity Cyber

Trinity Cyber’s patent-pending technology stops attacks before they reach internal networks,reducing risk and increasing cost to adversaries.

Carbonite

Carbonite

Carbonite offers all the tools necessary for protecting data from the most common forms of data loss, including ransomware, accidental deletions, hardware failures and natural disasters.

Innovasec

Innovasec

Innovasec provide information security consulting and training services.

CryptoSec.info

CryptoSec.info

CryptoSec.info is a web resource focused on educating the beginners in the cryptocurrency space on how to properly secure their online assets from hackers and scammers.

SecAlliance

SecAlliance

SecAlliance is a cyber threat intelligence product and services company.

Mitigate Cyber

Mitigate Cyber

Mitigate Cyber (formerly Xyone Cyber Security) offer a range of cyber security solutions, from threat mitigation to penetration testing, training & much more.

HashDit

HashDit

HashDit products and services focus on helping build a safe ecosystem for both protocol users and smart contract developers on BNB Chain.

Unciphered

Unciphered

Unciphered was created as the first company providing services for opening locked hardware cryptocurrency wallets.

Qodea

Qodea

Qodea (formerly Appsbroker CTS) is Europe's largest Google Premier only transformation partner.

Instil Software

Instil Software

Instil helps technology brands transform, innovate and disrupt their markets with category-defining software products that challenge us to think, feel and act in new ways.