NEWS > Cybersecurity News


« Back to News

2016-06-07

Real-life RoboCop Will Replace Human Cops By 2020

Dubai Police are developing robots capable of interacting with people and performing some of the responsibilities of a police officer.

2016-06-07

SWIFT Hackers Linked to ‘North Korean’ Lazarus Group

Symantec can link the malware used by the Sony hackers to attacks on the SWIFT interbank platform.

2016-06-07

Open Source Intelligence Can Predict Terrorist Attacks

Predata specialize in finding links between online interactions and upcoming physical events using metadata from YouTube and Wikipedia

2016-06-07

Unlikely Partners Build High Speed Trans-Atlantic Cable

MAREA: Microsoft and Facebook have recently announced that they are teaming up to build a subsea cable.

2016-06-06

The CIA Is Driving Cyber Intelligence In Australia

Cyber intelligence is much more than IT security and Australia is looking for outside help to update its intelligence practices.

2016-06-08

First Shots Of A New Cyber War

Iranian and Saudi Arabian hacking groups are throwing virtual punches. Are the two countries heading towards an outright cyber-war?

2016-06-01

Open Source Data Reveals Police Blunders

A blogger in New York has used public data to prove that the NYPD ticketed thousands of cars that were parked legally.

2016-06-06

Achieving Holistic Cybersecurity

CIOs and CISOs need timely cyber security insights to take proactive action, because today's security challenges are greater than ever.

2016-06-03

Data Analytics Governance Gets More Important

Companies are wading in and testing the potential of data analytics, but it’s important that they understand the limitations of those analytics.

2016-06-03

Ethical Hackers: We Want You For A New Recruit

In The Navy: USN plans to turn some of its sailors into ethical hackers to better defend it its computer networks.

2016-06-01

Not Just A Question Of Money: Cybersecurity And The CFO

Understanding cybersecurity trends & threats and translating that knowledge to board members should become one of the CFO’s key roles.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ASIS International

ASIS International

ASIS International is a global community of security practitioners with a role in the protection of assets - people, property, and/or information.

360Logica

360Logica

360Logica is a software testing company offering numerous kinds of testing services to improve the quality and performance of your software and IT systems.

Software Engineering Institute (SEI)

Software Engineering Institute (SEI)

At the CERT Division of SEI we study and solve cybersecurity problems, research security vulnerabilities in software, and develop information and training to help improve cybersecurity.

Cyber Triage

Cyber Triage

Cyber Triage is an automated incident response software any company can use to investigate their network alerts.

Pentest People

Pentest People

Pentest People are a UK-based security consultancy focussing on bringing the benefits of Pentesting as a Service (PTaaS) to all its clients.

Cysiv

Cysiv

Cysiv SOC-as-a-Service combines all the elements of an advanced, proactive, threat hunting SOC, with a managed security stack for hybrid cloud, network, and endpoint security.

NuCrypt

NuCrypt

NuCrypt is developing technology that is applicable to ultrahigh security data encryption as well as key distribution.

SecSign Technologies

SecSign Technologies

SecSign Technologies delivers user authentication, messaging, file sharing, and file storage with next generation security for company networks, websites, platforms, and devices.

Noname Security

Noname Security

Noname Security detects and resolves API vulnerabilities and misconfigurations before they are exploited.

Stryve

Stryve

Stryve is a leading carbon-neutral provider of specialist cloud and cybersecurity services in Europe.

Cyber Unit

Cyber Unit

Cyber Unit offer next level protection from cyber attacks in packages and pricing options that are accessible to smaller organizations.

Francisco Partners

Francisco Partners

Francisco Partners provide capital, expertise, and support for growth-aspiring technology companies.

Manifest

Manifest

Manifest is a cybersecurity company dedicated to helping enterprises secure their software supply chains.

InQuest

InQuest

InQuest specialize in providing comprehensive network-based security solutions that empower organizations to protect their most critical assets: their people.

Complete Cyber

Complete Cyber

Complete Cyber provide professional cybersecurity services and products to help secure your infrastructure, systems and data.

Hopper Security

Hopper Security

The Future of Open-Source Risk Management Starts Here. We built Hopper to make sure you can harness the power of Open-Source safely and effectively.