NEWS > Cybersecurity News


« Back to News

2016-08-10

ISIS Is Tooling Up For Cyber Jihad

Islamic terrorists are arming themselves with the technical tools & expertise to attack the online systems underpinning critical infrastructure.

2016-08-12

Defensive Measures: Estonia Will Store Citizens’ Data In The UK

Estonia is planning to back up its entire store of citizen data in the UK, fearing another cyberattack from neighboring Russia.

2016-08-10

Did Munich Gunman Get His Weapon On The Dark Web?

Unlike the U.S, it is quite hard to get access to automatic weapons in Germany. So where did the gunman get his weapon?

2016-08-10

Candidate Trump Supports Russian ‘cyber warfare’ Against US

Backlash over comments during a recent press conference in which he urged Russian hackers to steal rival candidate Hillary Clinton’s emails.

2016-08-08

Bio-Electronics: A New Business Controlling Human Organs With Electronic Implants

Google & GSK invest £540m in creating automated bio- electronic nerve implants to fix defects in human tissue.

2016-08-09

Cybersecurity Issues Are M&A Deal Breakers

M&A experts warn that due-diligence audits of companies targeted for acquisition often reveal cybersecurity risks that compromise compliance.

2016-08-09

Insider Trading: Ukrainian Hackers Accomplice Pleads Guilty

US stockbroker pleads guilty to conspiracy for his role in an insider-trading ring that reaped millions of dollars in illicit profits.

2016-08-09

Mobile Battery Tracks You Online

A little-known web standard that lets site owners tell how much battery life a mobile device has left has been found to enable tracking online.

2016-08-08

Brexit Leading To Rising Tide Of Cyber Scams

Economic uncertainty following the Brexit vote is creating the perfect conditions for cyber-fraud

2016-08-07

EU Cyber Crime Commissioner is King

Post Brexit Vote: Briton becomes EU commissioner for the 'security union' to develop European security and counter-terrorism plans.

2016-08-04

Clinton Campaign Confirm Mystery Hackers Accessed Data

Is Russia using hackers to influence the outcome of the US Presidential election and is the US using proxies to retaliate?

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

LogRhythm

LogRhythm

LogRhythm's security platform unifies SIEM, log management, network and endpoint monitoring, user behaviour analytics, security automation and advanced security analytics.

Logicalis

Logicalis

Logicalis are a leading provider of global IT solutions and managed services.

BeOne Development

BeOne Development

BeOne Development provide innovative training and learning solutions for information security and compliance.

Competence Center for Applied Security Technology (CAST)

Competence Center for Applied Security Technology (CAST)

CAST offers a range of services in the field of secure modern information technology and a contact point for all questions regarding IT security.

Cyber Threat Intelligence Network (CTIN)

Cyber Threat Intelligence Network (CTIN)

CTIN provides cyber threat intelligence services including training, platform evaluation, ISAC/ISAO systems development and counter botnet operations.

Sqreen

Sqreen

Sqreen is a web application security monitoring and protection solution helping companies protect their apps and users from attacks.

VerSprite

VerSprite

VerSprite is a specialist information security consulting firm. We provide organizations with detection across all their attack surfaces and deliver critical insight into all possible attack methods.

CybernetIQ

CybernetIQ

CLAW by CybernetIQ is the industry's most advanced SOAR platform helping unify all cybersecurity tools under one umbrella and providing organizations faster, better and more accurate cybersecurity.

YL Ventures

YL Ventures

YL Ventures funds and supports brilliant Israeli tech entrepreneurs from seed to lead.

DataPassports

DataPassports

DataPassports is a data-centric security and privacy solution that enforces privacy and security from end-to-end with transparent protection of data at the source.

High Security Center (HSC)

High Security Center (HSC)

High Security Center provide real-time threat protection. We protect your company from targeted and persistent attacks using technologies such as Machine Learning and Behavioral Analysis.

Gijima

Gijima

Gijima is one of SA’s leading ICT companies in Cloud & Outsourcing, Systems integration, Human Capital Management & Training, Cybersecurity, and Unified Communications.

AVANT Communications

AVANT Communications

AVANT is a premier distributor of next generation technologies with the resources and relationships needed to successfully navigate the ever-changing world of communications and IT infrastructure.

DIGISOC

DIGISOC

DIGISOC, a leader in Latin America in Cybersecurity solutions, combines machine learning with human intelligence to be effective in detecting cyber threats.

InfoSight

InfoSight

InfoSight offers proven Cyber Security, Regulatory Compliance, Risk Management and Infrastructure Solutions to protect your business and your customers from cyber crime and fraud.

Mart Networks

Mart Networks

Mart Networks is one of Africa’s Pioneers when it comes to Value Added Technology Distribution.