NEWS > Cybersecurity News


« Back to News

2015-11-11

Energy Under Hacktivist Threat

The FBI say that politically motivated Hackers are the second biggest threat to the U.S Energy sector, after it's own employees.

2015-11-11

Who Is In Charge if a Massive Cyber Attack Strikes the U.S?

Large scale cyber attacks on infrastructure may be unlikely, but if it happens, the chain of command is far from clear.

2015-11-13

EU votes Snowden Human Rights Asylum

MEPs last week voted Edward Snowden should be granted asylum in Europe on the grounds that he is a “defender of human rights.”

2015-11-12

MI5 Relies on Hacking

The British spy agency says it has “relied” on hacking techniques in “the overwhelming majority of high priority investigations" over the past year.

2015-11-12

The Dark Side of the Fourth Industrial Revolution – and How To Avoid It

With the Fourth Industrial Revolution and its promise of technological progress, comes a dark reality. Opinion By Espen Barth Eide and Anja Kaspersen

2015-11-12

The Shrinking of the Big Data Promise

The Big Data success stories for predicting human behavior over long terms don’t bear scrutiny. Opinion By Cory Doctorow

2015-11-14

10 Extreme Hacks

Any device with a computer chip can be hacked, but not all hacks are created equal. Truly innovative hacks are rare.

2015-11-12

Spyware Rises in Popularity with Governments

FinFisher was being used for activities beyond tracking criminals.

2015-12-28

Enterprises Don’t Have Big Data, They Have Bad Data

Big data alone is silly. Building an enterprise with smart, usable data is what every company should strive to create.

2015-11-12

How are Businesses Responding to Cyber Risks?

As cyber-risks become increasingly prominent concerns in boardrooms business leaders are increasingly rethinking cybersecurity practices.

2015-11-10

Military Robots Will Predict Your Next Move

New research may enable robotic-armed guards, or just help self-driving cars get through a four-way stop.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Holm Security

Holm Security

Holm Security are taking vulnerability assessment into the next generation as a cloud service.

Verint Systems

Verint Systems

Verint is a leader in CX automation. The world’s most iconic brands rely on our open platform and team of AI-powered bots to create tangible AI business outcomes, now.

Auth0

Auth0

Auth0 is a cloud service that provides a set of unified APIs and tools that instantly enables single sign-on and user management for any application, API or IoT device.

Cybrary

Cybrary

Cybrary is an open-source cyber security and IT learning and certification preparation platform.

TechVets

TechVets

TechVets is a non-for-profit helping UK veterans and service leavers retrain into Cyber Security and Technology jobs.

SenseOn

SenseOn

SenseOn’s multiple threat-detection senses work together to detect malicious activity across an organisation’s entire digital estate, covering the gaps that single point solutions create.

Aporeto

Aporeto

The Aporeto platform protects cloud applications from attack by authenticating and authorizing all communications with a cryptographically signed identity assigned to every workload.

Root9B (R9B)

Root9B (R9B)

R9B offers advanced cybersecurity products, services, and training to enhance the way organizations protect their networks.

CyberCube

CyberCube

CyberCube provide world-leading cyber risk analytics for the cyber insurance market.

Motorola Solutions

Motorola Solutions

Motorola Solutions build mission-critical services, software, video and analytics, backed by secure, resilient land mobile radio communications.

SecureTech360

SecureTech360

SecureTech360 is a cybersecurity and IT consulting firm whose principals have extensive experience in Cybersecurity and Information Technology.

GitProtect.io

GitProtect.io

​GitProtect is a fully manageable, professional GitHub and Bitbucket backup and recovery software that protects repositories and metadata from any event of failure.

SOOS

SOOS

SOOS is the easy-to-integrate software security solution for your whole team. Build, catch, and fix vulnerabilities with SOOS Software Composition Analysis.

Digimune

Digimune

Digimune is an all-encompassing cloud-based cyber risk protection platform that guards you against the dangers of our digital world.

Positiwise Software Pvt Ltd

Positiwise Software Pvt Ltd

Positiwise Software offers end-to-end software development solutions to accelerate the digital growth of businesses.

Defend-OT

Defend-OT

Defend-OT is a Belgium-based cybersecurity firm specializing in OT environments.