NEWS > Cybersecurity News


« Back to News

2016-06-08

RoboCop Is Real

At the Stanford shopping center in Palo Alto, California, there is a new sheriff in town – and it’s an egg-shaped robot.

2016-06-10

You Should Not Trust The Media

Hackers impersonate journalists to plant spyware.

2016-06-07

Seven Cyber-Security Myths Debunked

Security myths cause organisations to incorrectly assess threats, misallocate resources and set inappropriate goals.

2016-06-07

Real-life RoboCop Will Replace Human Cops By 2020

Dubai Police are developing robots capable of interacting with people and performing some of the responsibilities of a police officer.

2016-06-07

SWIFT Hackers Linked to ‘North Korean’ Lazarus Group

Symantec can link the malware used by the Sony hackers to attacks on the SWIFT interbank platform.

2016-06-07

Open Source Intelligence Can Predict Terrorist Attacks

Predata specialize in finding links between online interactions and upcoming physical events using metadata from YouTube and Wikipedia

2016-06-07

Unlikely Partners Build High Speed Trans-Atlantic Cable

MAREA: Microsoft and Facebook have recently announced that they are teaming up to build a subsea cable.

2016-06-06

The CIA Is Driving Cyber Intelligence In Australia

Cyber intelligence is much more than IT security and Australia is looking for outside help to update its intelligence practices.

2016-06-08

First Shots Of A New Cyber War

Iranian and Saudi Arabian hacking groups are throwing virtual punches. Are the two countries heading towards an outright cyber-war?

2016-06-01

Open Source Data Reveals Police Blunders

A blogger in New York has used public data to prove that the NYPD ticketed thousands of cars that were parked legally.

2016-06-06

Achieving Holistic Cybersecurity

CIOs and CISOs need timely cyber security insights to take proactive action, because today's security challenges are greater than ever.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Concise Technologies

Concise Technologies

Concise Technologies provide specialist IT and telecoms solutions, support services, managed backup, disaster recovery, cyber security and consultancy to SME businesses across the UK and Europe.

European Cyber Security Organisation (ECSO)

European Cyber Security Organisation (ECSO)

The main objective of ECSO is to support all types of initiatives or projects that aim to develop, promote and encourage European cybersecurity.

Copper Horse Solutions

Copper Horse Solutions

Copper Horse specialises in mobile and IoT security, engineering solutions throughout the product lifecycle from requirements to product security investigations.

Cloudbric

Cloudbric

Cloudbric is a cloud-based web security service, offering award-winning WAF, DDoS protection, and SSL, all in a full-service package.

Copenhagen FinTech

Copenhagen FinTech

Copenhagen FinTech is a centre for R&D and innovation in the Danish finance IT sector. Focus areas include cyber security and payments platforms.

CRU Data Security Group (CDSG)

CRU Data Security Group (CDSG)

CRU is a pioneer in devices for data mobility, data security, encryption, and digital investigation.

Security University

Security University

Security University is a leading provider of Qualified Hands-On Cybersecurity Education, Information Assurance Training and Certifications for IT and Security Professionals.

Securepoint

Securepoint

Securepoint is the market leader in the development of professional “Unified Threat Management” solutions in Germany.

Cyscale

Cyscale

Cyscale automates the contextual analysis of cloud misconfigurations, vulnerabilities, access, and data, to provide an accurate and actionable assessment of risk.

Hexaware Technologies

Hexaware Technologies

Hexaware is an automation-led next-generation service provider delivering excellence in IT, BPO and Consulting services.

ContraForce

ContraForce

ContraForce is a threat detection and response software providing complete visibility across cloud, network, endpoints, user, and email with the ability to target and block threats in real-time.

Mobileum

Mobileum

Mobileum is a leading provider of Telecom analytics for roaming, security and risk management and end-to-end domestic and roaming testing solutions.

Sunartek Labs

Sunartek Labs

Sunartek are equipped with expert resources and advanced technology to identify cyber threats and prevent any breach, bypassing the security network of your organization.

Riskonnect

Riskonnect

Riskonnect technology empowers organizations with the ability to anticipate, manage, and respond in real-time to strategic, operational, and digital risks across the extended enterprise.

Digital.ai

Digital.ai

Digital.ai empowers organizations to scale software development teams, continuously deliver software with greater quality and security.

CQR

CQR

CQR are at the forefront of innovative cyber solutions, dedicated to securing and fortifying Operational technology (OT) infrastructure.