NEWS > Cybersecurity News


« Back to News

2016-02-10

How to Recover From The Hack Nightmare

It’s more than just the PR department’s “problem.” IT executives need to be involved in managing the fallout and crafting responses.

2016-02-09

HSBC Bank In The Line Of Cyber Fire

HSBC says its UK online banking operation is being affected for the second time this year by a cyber attack that started in January.

2016-02-10

Protecting The Crown Jewels Of Corporate Data

Knowing that an organization will suffer a breach sooner or later, IT security professionals must first protect the company's most important data.

2016-02-09

Intelligence Agencies Want To Target Surveillance Programs

IoT devices and cloud-based services represent the next frontier for digital surveillance, claims a new report from Harvard's Berkman Center.

2016-02-09

Knowing Cognitive Computing

Cognitive computing is the tech industry’s latest ‘it’ thing. Not just within the Big Data world, but also outside that realm.

2016-02-10

CIA Mission To Kidnap Edward Snowden

A CIA aircraft and paramilitary team are standing by to kidnap Edward Snowden and return him to the US the moment he sets foot in Europe.

2016-02-09

There Are No Laws About Using Killer Robots

Tech experts including Stephen Hawking have warned us about the dangers of AI robots and there are no laws about using them.

2016-02-02

Criminals Impersonating Income Tax Collection Agencies

Cybercriminals are targeting India, US and other countries with fraudulent "tax deduction" emails to steal information,say Symantec.

2016-02-04

The Fourth Industrial Revolution

The Fourth Revolution uses hardware, robotics, and massive computing power to expand information technology beyond just software.

2016-02-03

The World’s Most Human Robot

Scientists in Singapore have unleashed their latest creation: the world’s most human-like robot.

2016-02-02

Experts Say Australia Is Ill-equipped For Cyberwar

China is rapidly expanding its capability for cyber-enabled war, as are other nations. Australia seems poorly equipped to face that challenge.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Delphix

Delphix

Delphix is the industry leader for DevOps test data management.

A-SIT Secure Information Technology Center

A-SIT Secure Information Technology Center

A-SIT was founded in 1999 as a registered nonprofit association and is established as a competence center for IT-Security.

Azeti Networks

Azeti Networks

Azeti Networks is a global provider of IoT technology to a variety of verticals including telecomms, oil/gas, manufacturing, finance and healthcare.

Consult Hyperion

Consult Hyperion

Consult Hyperion is an independent strategic and technical consultancy specialising in digital identity and secure electronic transactions.

Mondo

Mondo

Mondo is the largest national staffing agency specializing exclusively in high-end, niche IT, Tech, and Digital Marketing talent. Areas of expertise include Cybersecurity.

Cycura

Cycura

Cycura provide advanced, customized, and confidential cyber security services, cyber investigation services, and digital forensic services to governments, companies, and organizations.

IEEE Cyber Science and Technology Congress (CyberSciTech)

IEEE Cyber Science and Technology Congress (CyberSciTech)

CyberSciTech provides a platform for scientists, researchers, and engineers to share their latest ideas and advances in the broad scope of cyber-related science, technology, and application topics.

BLOCKO

BLOCKO

BLOCKO is a blockchain specialized technology company that has experienced and achieved the largest amount of business in South Korea.

National Health Care Anti-Fraud Association (NHCAA) - USA

National Health Care Anti-Fraud Association (NHCAA) - USA

National Health Care Anti-Fraud Association is the leading national organization focused exclusively on the fight against health care fraud.

CYBER.ORG

CYBER.ORG

CYBER.ORG's goal is to empower educators as they prepare the next generation to succeed in the cyber workforce of tomorrow.

DAtAnchor

DAtAnchor

Anchor is simply a better way to protect and control sensitive data. Zero-trust, data-centric security. Simplified.

D.med Software

D.med Software

D.med Software is a company with a focus on cybersecurity for embedded software and cloud applications for the medical industry.

SFY Information Technology

SFY Information Technology

SFY helps companies with Cyber Security and Managed IT, allowing them to focus on what really matters to them.

Inveo Group

Inveo Group

Inveo group is the Italian leader for the management of privacy and data protection issues.

Panasonic Automotive Systems

Panasonic Automotive Systems

Panasonic Automotive Systems brings together security technologies and human resources cultivated across an extensive range of businesses into the automotive field.

CQR

CQR

CQR are at the forefront of innovative cyber solutions, dedicated to securing and fortifying Operational technology (OT) infrastructure.