NEWS > Cybersecurity News


« Back to News

2015-12-18

IBM’s $1 Billion Revenue Target For Cloud In 2016

IBM has set an internal revenue goal for SoftLayer, its cloud-infrastructure business, of $1 billion in 2016, a person with knowledge of the matter said.

2015-12-16

Bitcoin's Forked: Chief Scientist Launches Alternative

Cryptocurrency bitcoin is facing civil war, with two high-profile developers announcing plans to split the code that underpins the network.

2015-12-18

Third of UK Finance Logins Risk Client Data

Many industry personnel are not assigned unique login and password details, resulting in the risk of customer's personal and financial data.

2015-12-21

Email Data Breaches: The Threat Keeps Giving

2015 - A year of unprecedented data breaches. Major government agencies & consumer sites were hacked, millions of users were compromised.

2016-01-08

What Does a Cyber Security Strategy Look Like?

The top management and board of directors should own cyber security, its implementation and response.

2015-12-18

Facebook Rule Change After Privacy Ruling

Facebook is locking people out of its site unless they are registered users, following a Belgian privacy ruling.

2015-12-14

Can Surveillance Drones Prevent the Next Kunduz?

Basic communications failures in contributed to a tragedy in which more than 30 people died at Kunduz, in Afghanistan,

2015-12-16

Can Big Data Help Climate Change?

The Earth is big and its climate is complicated. To understand it, scientists turn to big, complicated climate simulations that run on supercomputers.

2015-12-28

The True Cost of Surveillance

New legislation to regulate spying in the UK seeks to combine numerous existing powers and make them all subject to coherent oversight.

2015-12-15

Malware Mixed Into A Cyber Threat Cocktail

On The Rocks: Cybercrime group combines Pony, Angler and CryptoWall 4.0 in a single campaign slammer.

2015-12-15

Cyber Warfare: An Integral Part of Modern Politics

Cyber-operations are being used for a wide range of information warfare & intelligence gathering purposes, according to NATO.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Telia Cygate

Telia Cygate

Cygate are specialists in information security, data networks, and data centre and cloud technologies.

Korea Information Security Industry Association (KISIA)

Korea Information Security Industry Association (KISIA)

KISIA is a non-profit organization for the information security industry in Korea.

Intertek Group

Intertek Group

Intertek Group provides Assurance, Testing, Inspection and Certification services. Activities include cybersecurity testing and certification.

Basis Technology

Basis Technology

Basis Technology provides software solutions for text analytics, information retrieval, digital forensics, and identity resolution.

Purple Security

Purple Security

Purple Security arises from the association of specialists in offensive security (ethical hackers, white hats) and experts in insurance, compliance and implementation of industry standards.

GoCyber

GoCyber

GoCyber is a new, highly innovative cyber security training app that uses action based learning to significantly improve the online behaviour of all employees in less than a month.

SecZetta

SecZetta

SecZetta provides third-party identity risk solutions that are easy to use, and purpose built to help organizations execute risk-based identity access and lifecycle strategies.

Business Resilience International Management (BRIM)

Business Resilience International Management (BRIM)

Business Resilience International Management (BRIM) is engaged by law enforcement in the UK and overseas to advise on establishing and developing Cyber Resilience Centres (CRCs) for business.

Intellias

Intellias

Intellias is a trusted technology partner to top-tier organizations and digital natives helping them accelerate their pace of sustainable digitalization.

Seccuri

Seccuri

Seccuri is a unique global cybersecurity talent tech platform. Use our specialized AI algorithm to grow and improve the cybersecurity workforce.

Information Systems Security Association (ISSA)

Information Systems Security Association (ISSA)

ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

CYBRI

CYBRI

CYBRI is a cybersecurity company helping businesses detect and remediate mission-critical vulnerabilities before they get exploited by hackers.

nandin Innovation Centre

nandin Innovation Centre

nandin is ANSTO’s Innovation Centre (Australian Nuclear Science and Technology Organisation) where science and technology entrepreneurs, startups and graduates come together.

Quotient

Quotient

Quotient builds digital experiences that empower and inspire the American people by understanding their needs, simplifying complex technical solutions and adapting to how they work, live and learn.

ModelOp

ModelOp

ModelOp is the leading AI Governance software for enterprises and helps safeguard all AI initiatives.

Faddom

Faddom

Faddom is an agentless tool that visualizes your on-premises and cloud infrastructure, as well as their inter-dependencies.