NEWS > Cybersecurity News


« Back to News

2016-08-17

Cybersecurity Due Diligence Is Critical

The potential costs of cybersecurity problems to public companies are simply enormous.

2016-08-17

Easy: Hackers Take Down A Hospital

Using only a few USB sticks, hackers got into the hospital network, taking over medicine-dispensing devices. Death was a literal keystroke away.

2016-08-15

Artificial Intelligence - Hope Or Illusion?

Are we entering an age where machines will take over from humans, for the better or worse?

2016-08-15

James Bond - Pen Tester

Pen-testing can use deception to counter spear-phishing and other superficially benign threats.

2016-08-15

5 Reasons IT Leaders Should ImproveTechnical & ‘Soft’ Skills

The ability to communicate technical information to a non-technical audience is increasingly important as IT integrates with overall business functions.

2016-08-12

Hackers Help FBI Fight Cybercrime

The FBI needed undisclosed outside help to crack the San Bernadino shooter's iPhone. Now they are looking for help to fight ransomware.

2016-08-12

Hacking May Prompt Heightened US Election Security

US Security officials are thinking of designating elections as national critical infrastructure after recent hacking attacks on the political parties.

2016-08-10

Banks Look Up To The Cloud

Banks are growing more comfortable using other companies’ servers instead of their own closely guarded data centers.

2016-08-10

ISIS Is Tooling Up For Cyber Jihad

Islamic terrorists are arming themselves with the technical tools & expertise to attack the online systems underpinning critical infrastructure.

2016-08-12

Defensive Measures: Estonia Will Store Citizens’ Data In The UK

Estonia is planning to back up its entire store of citizen data in the UK, fearing another cyberattack from neighboring Russia.

2016-08-10

Did Munich Gunman Get His Weapon On The Dark Web?

Unlike the U.S, it is quite hard to get access to automatic weapons in Germany. So where did the gunman get his weapon?

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyber Security Associates (CSA)

Cyber Security Associates (CSA)

Cyber Security Associates provides cyber consultancy and cyber managed services which help to detect, protect and educate against the ever-changing cyber threat.

Allen & Overy

Allen & Overy

Allen & Overy is an international law firm. Practice areas include Cybersecurity and Data Protection.

IBackup

IBackup

IBackup is a Web Based Online Backup service provider.

Anomali

Anomali

Anomali delivers intelligence-driven cybersecurity solutions to enhance threat visibility, automate threat processing and detection, and accelerate threat investigation, response, and remediation.

Mitchell Sandham

Mitchell Sandham

Mitchell Sandham is an, independent insurance and financial services brokerage. Business products include Cyber/Privacy Liability insurance.

One Identity

One Identity

One Identity delivers identity governance, access management, and privileged account management solutions that facilitate and secure your digital transformation.

Cienaga Systems

Cienaga Systems

Cienaga Systems is a leader in autonomous cyber threat hunting technology.

Hitachi Systems Security

Hitachi Systems Security

Hitachi Systems Security provides customized services for monitoring and protecting the most critical and sensitive IT assets in our clients’ infrastructures 24/7.

Verifi

Verifi

Verifi is an award-winning provider of end-to-end payment protection and risk management solutions.

ISA Global Cybersecurity Alliance (ISAGCA)

ISA Global Cybersecurity Alliance (ISAGCA)

Objectives of the ISA Global Cybersecurity Alliance include the acceleration and expansion of standards, certification, education programs, advocacy efforts, and thought leadership.

ScorpionShield

ScorpionShield

ScorpionShield CyberSecurity is an EC-Council Accredited Training Center, and an On-Demand Service for Cybersecurity professionals.

CyBourn

CyBourn

Cybourn's diverse offerings include engineering, analysis, product development, assessment, and advisory services in the cybersecurity space.

Cydea

Cydea

Cydea are an optimistic cyber security consultancy of experts in security, data, technology and design that want to build a safer, more secure world where more things go right.

Prophet Security

Prophet Security

Prophet Security empowers organizations to triage, investigate, and respond to alerts with unparalleled speed and accuracy.

Vault Cloud

Vault Cloud

Vault Cloud, Australia's National Cloud, is an Australian owned and operated company specialising in secure, sovereign, hyperscale cloud infrastructure.

Hunt & Hackett

Hunt & Hackett

Hunt & Hackett helps European companies prevent, detect and respond to today’s most advanced adversaries, safeguarding them against cyberthreats and espionage.