NEWS > Cybersecurity News


« Back to News

2016-05-02

Snowden Intervenes In The Encryption Debate

Speaking from safety in Moscow, Snowden argued that the security of the Internet is more important than the convenience of law enforcement.

2016-05-02

Bangladesh Bank Hackers Compromised SWIFT

Attackers who stole $81 million from the Bangladesh central bank hacked into software from the SWIFT financial platform.

2016-04-26

US Give Philippines Eyes On The South China Sea

The United States will give its oldest Asia-Pacific security ally $42 million worth of sensors, radar and communications equipment.

2016-04-26

Cybercrime Increases As Crooks Get AI Smarter

Symantec's 2016 Internet Security Threat Report reveals that 2015 saw an increase in hacking numbers and smarter attacks.

2016-04-27

On the Brink of Cyber War…

Moscow, Washington Meet Quietly in Geneva to renew efforts to prevent rushing into a cyber war “by mistake,”

2016-04-27

MoD Email Blunder Leaks Secret NATO Report

The British Ministry of Defence (MoD) made an 'administrative error' leading to the accidental leak of a secret NATO document.

2016-04-27

GCHQ Approved: Ten Cyber Degree Courses

Courses from the leading UK Universities provide elite training in cyber security endorsed & approved by GCHQ.

2016-04-29

Analytics To Discover Who's Really Who

Cyber-attacks show no signs of slowing down, and organizations continue to look at any & all approaches to improving security.

2016-04-26

EU General Data Protection Regulation Finally Passes

A two-year implementation process will begin the final step to completion before the regulation becomes EU law.

2016-04-27

The CIA Invests In Firms That Mine Social Media

Soft robots that can grasp delicate objects, computer algorithms designed to spot an “insider threat,” and artificial intelligence sifting large data sets.

2016-04-29

EU Data Chiefs Call For Rethink Of Privacy Shield

EU data protection bosses have confirmed they have rejected the proposed Privacy Shield data transfer agreement with US.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ExaGrid Systems

ExaGrid Systems

ExaGrid provides Tiered Backup Storage with a unique disk-cache Landing Zone, long-term retention repository, and scale-out architecture.

Adeptis Group

Adeptis Group

Adeptis are experts in cyber security recruitment, providing bespoke staffing solutions to safeguard your organisation against ever-changing cyber threats.

TeachPrivacy

TeachPrivacy

TeachPrivacy provides computer-based privacy and data security training that is engaging, memorable, and understandable.

Farsight Security

Farsight Security

Farsight Security provides the world’s largest real-time actionable threat intelligence on how the Internet is changing.

Redstor

Redstor

Redstor's complete data management helps you discover, manage and control your data from a single control centre, unifying backup and recovery, disaster recovery, archiving and search and insight.

SWAT Systems

SWAT Systems

SWAT Systems is an IT support and cyber security managed service provider.

SuperCom

SuperCom

SuperCom are a global secure solutions integrator and technology provider for governments and other consumers facing organizations around the world.

Query.ai

Query.ai

At Query.AI, we are committed to helping companies unlock the power of their security data, so they are empowered to meet security investigation and response goals while simultaneously reducing costs.

Axiado

Axiado

Axiado Corporation is a security processor company redefining hardware root of trust with hardware-based security technologies, including per-system AI.

Dataships

Dataships

We help companies automate their privacy compliance while building healthy, transparent data relationships with their customers.

StickmanCyber

StickmanCyber

At StickmanCyber we are on a mission to create a digital world that is safe for everyone - we are your trusted cybersecurity partner.

Mr Backup (MRB)

Mr Backup (MRB)

MRB offers Data Protection as a Service for businesses looking to reduce the time, cost and complexity of securing your company data.

Orchestrate Technologies

Orchestrate Technologies

Orchestrate Technologies provides computer network and IT managed services for small and mid-market clients as well as small enterprise businesses.

Onum

Onum

Onum helps security and IT leaders focus on the data that's most important. Gain control of your data by cutting through the noise for deep insights in real time.

Keyrus

Keyrus

Keyrus is a global consultancy that develops data and digital solutions for performance management.

Softanics

Softanics

Softanics’ ArmDot protects .NET apps with advanced obfuscation, control flow protection, and virtualization, securing code against reverse engineering without requiring agents or environment changes.