NEWS > Cybersecurity News


« Back to News

2015-12-14

The Future Of Healthcare Systems Is ‘Unsexy Plumbing’

The technology companies that can get data integration right will be healthcare’s true change-makers.

2015-12-18

Age of Hackers Drops to 17

The UK National Crime Agency says the average age of suspected cyber-attackers has dropped dramatically to just 17.

2015-12-14

French Government Proposals To Block Tor and Forbid Free Wi-Fi

Le Monde reports two proposals for legislation, one around the state of emergency, and the other related to counterterrorism measures.

2015-12-22

Can You Solve The GCHQ Christmas Card Puzzle?

The British surveillance & intelligence agency GCHQ is sending out a Christmas card this year with a brain - teasing puzzle.

2015-12-18

Spies Want IBM’s Quantum Computer

One key area where quantum computers could have an impact is encryption and security.

2015-12-11

The Biggest Cybersecurity Risk Is Not Identity Theft

Hackers who deface websites, apps and other sources to spread false information present a very real threat.

2015-12-11

Microsoft Leads FBI Coalition To Destroy Botnet

To take down Win32/Dorkbot, Microsoft worked with ESET, Department of Homeland Security, Europol, FBI and Interpol.

2015-12-09

Cyber War Pre-emption Is The Key to Defense

The United States' best defense against a crippling cyber attack could be a more visible offensive lineup.

2015-12-09

Gateway For Hackers

Routers - devices that connect people to the Web, sometimes called “the backbone of the Internet”, are dangerously vulnerable to hackers.

2015-12-09

Has The US Become Complacent About Resisting Cyber Attacks?

No longer in the news: Accounts of cyberattacks these days seem to produce yawns.

2015-12-09

First Ever EU Rules On Cybersecurity

Europe's critical digital infrastructure will be required to meet basic security standards.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

International School of IT Security (ISITS)

International School of IT Security (ISITS)

The International School of IT Security (ISITS) is a leading provider of professional training in the field of IT Security.

cPacket Networks

cPacket Networks

cPacket’s distributed intelligence enables network operators to proactively identify imminent issues before they negatively impact end-users.

Egis Technology

Egis Technology

Egis specializes in the IC design, research and development, and the testing and sales of capacitive fingerprint sensor.

idappcom

idappcom

idappcom provides unique industry approved software solutions for auditing and enhancing the threat recognition and response capabilities of your corporate security defences.

Fedco International

Fedco International

Fedco International is an IT and SCADA ICS Security consultancy firm.

Infosec Train

Infosec Train

Infosec Train provide professional training, certifications & professional services related to all spheres of Information Technology and Cyber Security.

Variti

Variti

Variti Intelligent Active Bot Protection technology — traffic analysis, detection and stopping of malicious bots in real-time and effective response to DDoS attacks.

N8 Identity

N8 Identity

N8 Identity helps organizations realize the vision of Autonomous Identity Governance™ with AI-driven Identity solutions.

Omnipotech

Omnipotech

Omnipotech is a complete managed service provider. From desktop to datacenter, all the technology support you need, under one umbrella.

Trisul Network Analytics

Trisul Network Analytics

Trisul helps organizations deploy full spectrum deep network monitoring which can serve as a single source of truth for performance monitoring, security analytics, threat detection and compliance.

MyTurn Career LLC

MyTurn Career LLC

Looking for a rewarding career in cybersecurity? Explore a wide range of cybersecurity jobs and opportunities in this rapidly evolving field.

Zluri

Zluri

Zluri is a cloud-native SaaSOps platform enabling modern enterprises with SaaS Management and Identity Governance.

Two99

Two99

Two99 provide tailored excellence in the areas of E-Commerce, Marketing, Consulting, and Cyber Security.

SafeLiShare

SafeLiShare

SafeLiShare’s data security platform unifies encryption strategies for organizations with hybrid and multi-cloud infrastructures, ensuring data is secure regardless of its location.

CrashPlan

CrashPlan

CrashPlan delivers secure, continuous endpoint backup and recovery for businesses of all sizes.

Halo Security

Halo Security

Halo Security is a fast, easy, and scalable external attack surface management platform that gives security leaders deep visibility into their internet-facing assets.