NEWS > Cybersecurity News


« Back to News

2016-04-04

New Study Ranks Nations On Cyber Vulnerability

Data-mining experts have ranked the vulnerability of forty-four nations to cyberattacks and the results may surprise you.

2016-04-01

Apple's Questionable Victory Over the FBI

Apple has suffered one major casualty in its legal victory over the FBI: bragging rights over the iPhone’s security.

2016-04-04

Cars Really Are Increasingly Vulnerable To Cyberthreats

Modern cars are "increasingly vulnerable" to hacking after researchers proved it is possible to disable brakes and manipulate steering remotely.

2016-04-01

Ex-CIA Chief: ‘If we don’t handle China well, it will be catastrophic’

General Michael Hayden turned the CIA into a militarised force. He now thinks the obsession with counter-terrorism obscures more serious threats.

2016-03-30

Germany’s BND Intelligence Agency Is Cutting Cooperation With The NSA

Germany's BND has drastically cut cooperation with the NSA over covert US surveillance of European officials and companies.

2016-04-01

What Do UK Consumers Think About SMEs’ Cyber Security?

KPMG's Small Business Reputation & The Cyber Risk survey gives us valuable information about what consumers think about cyber security.

2016-03-31

5 Major US Hospital Hacks

In real-world war, combatants typically don’t attack hospitals. In the cyber realm, hackers have no such scruples.

2016-03-30

Blockchain – The Most Disruptive Invention Since The Internet

Very few people seem to realize that the blockchain will change every transactional process you know.

2016-03-30

Five Technology Trends To Change The World

Here are five trends that will have a transforming impact for business in the Intelligence Age.

2016-03-30

TalkTalk Launches Secure Biometric Authentication

TalkTalk has become one of the first major companies to use biometric authentication following last year's £60m data breach.

2016-03-30

New British Cybersecurity Centre Has A Focus On Financial Services

The first task of the new UK Cybersecurity Centre will involve setting cyber resilience standards for the financial services sector.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ISACA Conferences

ISACA Conferences

ISACA is dedicated to offering the most dynamic and inclusive conferences to keep you abreast of the latest advances in IT and Information Security.

KLDiscovery

KLDiscovery

KLDiscovery is a global leader in delivering best-in-class eDiscovery, information governance and data recovery solutions.

Endian

Endian

Endian’s mission is to provide a secure platform that connects distributed people and things, simplifying the digitalization of businesses.

SensorHound

SensorHound

SensorHound’s mission is to improve the security and reliability of the Internet of Things (IoT).

Capsule8

Capsule8

Capsule8 is the only company providing high-performance attack protection for Linux production environments.

Westminster Insight - Cyber Security Conference

Westminster Insight - Cyber Security Conference

Join colleagues this December for Westminster Insight’s Cyber Security Conference, as you’ll assess how new technologies such as AI can secure your organisation against future threats.

astarios

astarios

astarios provide near-shore software development services including secure software development (DevSecOps), quality assurance and testing.

Binare

Binare

Binare empowers companies all over the world to improve their IIot/IoT /Embedded cybersecurity posture and digital privacy.

Aura

Aura

Aura is a mission driven technology company dedicated to creating a safer internet for everyone. We’re making comprehensive digital security that's simple to understand and easy to use.

Data Priva

Data Priva

Data Priva is the UK's leading subscription-based data protection, governance, risk and and compliance service.

Descope

Descope

Descope is a service that helps every developer build secure, frictionless authentication and user journeys for any application.

Proximus Ada

Proximus Ada

Proximus Ada is the first Belgian center of excellence combining artificial intelligence and cybersecurity.

Three Wire Systems

Three Wire Systems

Three Wire is a leader in innovative and efficient technology solutions for government agencies and large enterprise corporations.

Enterprise Strategy Group

Enterprise Strategy Group

Enterprise Strategy Group, a division of TechTarget, is an IT analyst, research, validation, and strategy firm that provides market intelligence and actionable insight to the global IT community.

CyberNut

CyberNut

CyberNut are a security awareness training solution built exclusively for schools.

Pontiro

Pontiro

At Pontiro, we are enabling a new era of data-sharing. Bridging the gap between protected data and valuable insights through the use of cutting edge Homomorphic Encryption.