NEWS > Cybersecurity News


« Back to News

2016-03-30

New British Cybersecurity Centre Has A Focus On Financial Services

The first task of the new UK Cybersecurity Centre will involve setting cyber resilience standards for the financial services sector.

2016-03-30

Shopping List: Cybersecurity Acquisitions In 2016

2016 has already seen several big companies buying up smaller, privately held firms as they look to plug the gaps in their solutions.

2016-03-30

Cyber Criminal Underground In The Deep Web

A new report published by the experts at TrendMicro highlights the differences between the principal underground ecosystems worldwide.

2016-03-30

Swedish Police Investigate Media Cyber-Attacks

Swedish police say they are investigating major cyber attacks against some of the country's leading media companies.

2016-03-30

Driverless Truck Convouys To Get UK Trials

Driverless lorries and cars will be trialed in the UK, the government has confirmed.

2016-03-30

Anonymous Threaten ISIS After Belgium Attacks

Anonymous has come forward and issued a threat against the Islamic State terrorist group, warning of impending cyber-attacks.

2016-03-29

NSA Hacked Penatgon Command-Control In 4 Days

History: In the first-ever exercise testing the US military's cyber defenses in 1997 the NSA hacked into the DoD's entire network in 4 days flat.

2016-03-29

Poland Strengthens Cybersecurity Against Russian Threat

Poland moves to unify cybersecurity response and bolster its defences in the wake of Russian hybrid warfare against neighbouring Ukraine.

2016-03-29

FBI Can Unlock iPhone Without Apple’s Help

US authorities have cancelled the court hearing with Apple, saying an ‘outside party’ has shown a potential way to crack Syed Farook’s iPhone.

2016-03-29

Clinton Emails Suggest Google's Assistance In Undermining Assad

An interactive tool created by Google was designed to encourage Syrian rebels and help bring down the Assad regime.

2016-03-31

Facial Recognition Might Stop the Next Brussels

Keeping terrorists away from crowded spaces requires recognizing them before they get there. No easy task.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

KoolSpan

KoolSpan

KoolSpan’s security and privacy solutions address the growing threat of loss or theft of intellectual property, information, and proprietary assets.

Cienaga Systems

Cienaga Systems

Cienaga Systems is a leader in autonomous cyber threat hunting technology.

Cyberteq

Cyberteq

Cyberteq is an innovative Information and Communication Technology Consulting Company, enabling it’s customers to take full advantage of the latest technologies in a secure manner.

SkillCube

SkillCube

SkillCube is one of the pioneers in India focusing on Cyber Security Skill Development Solutions.

Neudomains

Neudomains

Neudomains is a Corporate Domain Name Management and Brand Protection Online Specialist. One of the world's top providers of online brand protection and enforcement.

Key Cyber Solutions

Key Cyber Solutions

Key Cyber is an IT consulting firm that specializes in agile software development services, program management and infrastructure services, cyber security and cloud and managed services.

BlueAlly

BlueAlly

BlueAlly helps clients scale, optimize, and manage their IT resources to reach their business goals.

Hadrian

Hadrian

Hadrian is modernizing offensive security practices with automation, making them faster and more scalable. Equipped with the hacker’s perspective, companies can now know what their critical risks are.

Tuta

Tuta

Tuta (formerly Tutanota) is an all-in-one email, calendar and contacts app which protects your data with full end-to-end encryption and it requires zero personal information.

Secrutiny

Secrutiny

Scrutiny's core services include Cyber Maturity, Cyber Risk Analyser, Cyber Controls, Incident Response, SOC, Cyber Recovery and Assurance Testing.

Getronics

Getronics

Getronics guides customers through their own transformation journeys, leveraging an integrated and secure-by-design IT portfolio.

G-71

G-71

G-71 LeaksID is a cutting-edge ITM technology aimed at safeguarding sensitive documents from insider threats.

Veza Technologies

Veza Technologies

Veza is the authorization platform for data. Built for hybrid, multi-cloud environments, Veza enables organizations to manage and control who can and should take what action on what data.

Oduma Solutions

Oduma Solutions

Oduma Solutions is a wholly owned Ghanaian Cybersecurity company that offers information security services to organisations seeking to improve their security posture.

Black Belt Secure

Black Belt Secure

We provide critical cybersecurity services such as managed security, ransomware mitigation, penetration testing, system auditing and compliance services to your organization.

Grey Market Labs

Grey Market Labs

Grey Market Labs is a special place. It is a data privacy and security skunkworks.