NEWS > Cybersecurity News


« Back to News

2016-04-26

EU General Data Protection Regulation Finally Passes

A two-year implementation process will begin the final step to completion before the regulation becomes EU law.

2016-04-27

The CIA Invests In Firms That Mine Social Media

Soft robots that can grasp delicate objects, computer algorithms designed to spot an “insider threat,” and artificial intelligence sifting large data sets.

2016-04-29

EU Data Chiefs Call For Rethink Of Privacy Shield

EU data protection bosses have confirmed they have rejected the proposed Privacy Shield data transfer agreement with US.

2016-04-27

Chinese Whistleblower Sentenced To Death For Leaking State Secrets

Computer technician Huang Yu has been sentenced to death for leaking over 150,000 classified documents to an unidentified foreign power.

2016-04-26

CEO Fraud Skyrockets 270%

The FBI has issued an alert, warning about a dramatic increase in CEO-fraud email scams: To the tune of a 270%.

2016-04-27

Russia Blamed For Swedish Air Traffic Hack

A major cyberattack on Sweden's air traffic control system is allegedly due to Russia testing out its electronic warfare capabilities.

2016-04-29

Google Faces EU Monopoly Law Over Android Dominance

Google has been issued formal antitrust charges over claims that it abuses the dominant position of its Android operating system.

2016-04-27

Snowden On Police Chasing Journalist’s Data

Edward Snowden has condemned Australian law enforcement for collecting a journalist's communications records without a warrant.

2016-04-23

Smart UAE Police Cars For Expo 2020

The roads of the UAE will be patrolled by smart police cars equipped with remote control features, cameras & radars in time Expo 2020.

2016-04-24

#PanamaPapers: The Biggest Leak In History

'More data than you have ever seen'. Are we about to witness a new era of Mega Leaks?

2016-04-19

CYBERCOM Elevated To Full Combatant Command Status

Cyber warriors are today not just defending military networks but joining in combined-arms attacks on the enemy.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BlackBerry Cybersecurity

BlackBerry Cybersecurity

Blackberry provides intelligent security software and services to enterprises and governments around the world.

Cyjax

Cyjax

Cyjax monitors the Internet to identify the digital risks to your organisation, including cyber threats, reputational risks and the Darknet.

EvoNexus

EvoNexus

EvoNexus is a technology startup incubator with locations in San Diego, Orange County, and Silicon Valley.

Techleap.nl

Techleap.nl

Techleap.nl is a non-profit publicly funded organisation helping to quantify and accelerate the tech ecosystem of the Netherlands.

ClubCISO

ClubCISO

ClubCISO is a community of peers, working together to help shape the future of the information security profession by facilitating independent discussion on data security and cyber resilience.

Nassec

Nassec

Nassec is a Cyber Security firm dedicated to providing the best vulnerability management solutions. We offer tailor-made cyber security solutions based upon your requirements and nature of business.

KSOC Labs

KSOC Labs

KSOC is an event-driven SaaS platform built to automatically remediate Kubernetes security risks.

SK Shieldus

SK Shieldus

SK shieldus are a converged security provider with business capabilities in both cybersecurity and physical security based on Big-Tech.

Red Access

Red Access

Red Access provides the first SaaS-based platform to protect web browsing from cyber threats on any browser and any in-app while ensuring frictionless user experience.

SafeBase

SafeBase

Safebase provide the infrastructure for Trust Communication. Our Trust Center enables Security and Sales teams to share and automate access to security, compliance, and privacy information.

LOCH Technologies

LOCH Technologies

LOCH Wireless Machine Vision platform delivers next generation cybersecurity, performance monitoring, and cost management for all 5G and for broad-spectrum IoT, IoMT and OT wireless environments.

Neya Systems

Neya Systems

Neya Systems, a leader in advanced off-road autonomy and high-level multi-robot mission planning, provides innovative solutions for uncrewed ground, aerial, and surface vehicles.

ThreatView by Turaco Labs

ThreatView by Turaco Labs

ThreatView combines extensive experience in digital forensics with advanced analytics and threat detection capabilities to protect eCommerce websites.

Mantra

Mantra

Empower your employees against hackers with Mantra's first all-in-one phishing simulation and cybersecurity awareness platform.

Rocket Software

Rocket Software

Rocket Software helps customers in all industries solve their most complex IT challenges, across infrastructure, data, and applications — with solutions that simplify, not disrupt.

QuantumGate

QuantumGate

QuantumGate are a team of world-class cryptographers, cybersecurity professionals and researchers. We help organizations protect their data assets in a post-quantum world.