NEWS > Cybersecurity News


« Back to News

2015-11-12

The Dark Side of the Fourth Industrial Revolution – and How To Avoid It

With the Fourth Industrial Revolution and its promise of technological progress, comes a dark reality. Opinion By Espen Barth Eide and Anja Kaspersen

2015-11-12

The Shrinking of the Big Data Promise

The Big Data success stories for predicting human behavior over long terms don’t bear scrutiny. Opinion By Cory Doctorow

2015-11-14

10 Extreme Hacks

Any device with a computer chip can be hacked, but not all hacks are created equal. Truly innovative hacks are rare.

2015-11-12

Spyware Rises in Popularity with Governments

FinFisher was being used for activities beyond tracking criminals.

2015-12-28

Enterprises Don’t Have Big Data, They Have Bad Data

Big data alone is silly. Building an enterprise with smart, usable data is what every company should strive to create.

2015-11-12

How are Businesses Responding to Cyber Risks?

As cyber-risks become increasingly prominent concerns in boardrooms business leaders are increasingly rethinking cybersecurity practices.

2015-11-10

Military Robots Will Predict Your Next Move

New research may enable robotic-armed guards, or just help self-driving cars get through a four-way stop.

2015-11-14

What the Next 10 Years of Automation Means for Job Market

Current trends in AI and automation with existing algorithms & technologies are likely to have a big influence in the job-market.

2015-11-14

The Top 10 Information Security Jobs

Demand for Cybersecurity workers is outstripping supply and pay is going up.

2015-11-11

Conditional Clearance For Hackers To Test Automotive & Healthcare Security

U.S. Researchers will be able to look for flaws in software running on cars and medical devices without fearing legal action.

2015-11-11

Julian Assange: Google is Hillary Clinton's 'Secret Weapon'

A Google offshoot is building the infrastructure for personalized, data-driven election campaigning in the 2016 U.S Presidential race.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Montash

Montash

Montash is an award winning, global technology recruitment business, specialising in the acquisitions of high-performing talent across a number of core disciplines including Information Security.

British Assessment Bureau

British Assessment Bureau

The British Assessment Bureau is an ISO certification body. We check conformity and compliance of companies to recognised ISO standards including ISO 27001.

enSilo

enSilo

enSilo secures customers data on premise or in the cloud. Regardless of the where the threat comes from, enSilo can protect your data.

National Information Security & Safety Authority (NISSA) - Libya

National Information Security & Safety Authority (NISSA) - Libya

NISSA is responsible for safeguarding the integrity, availability and resilienceof ICT infrastructure, resources, services and data in Libya.

IABG

IABG

IABG offer independent, product-neutral consulting as well as technical and scientific services for the use of safety-relevant systems and technologies.

Security & Intelligence Agency (SOA) - Croatia

Security & Intelligence Agency (SOA) - Croatia

SOA is the Croatian security and intelligence service. Areas of activity include Cyber Security and Information Security.

Office of the National Security Council (UVNS) - Croatia

Office of the National Security Council (UVNS) - Croatia

UVNS coordinates, harmonizes the adoption and controls the implementation of information security measures and standards in the Republic of Croatia.

Nokia

Nokia

Nokia is a proven leader in fixed, mobile and IoT security offering capabilities that range from systems design to integration and support.

White Hawk Software

White Hawk Software

White Hawk provides code tamper-proofing solutions to protect mission critical software applications from malicious and Zero day attacks and reverse engineering at run time.

Atakama

Atakama

With Atakama, data remains encrypted until the very moment it is used, and the ability to decrypt is based on zero trust architecture.

Byos

Byos

Byos provides visibility of devices across all networks, regardless of location, integrating with your existing security stack.

Prescient Solutions

Prescient Solutions

Prescient Solutions is a managed services provider, using a cloud-based model to provide IT solutions to small, mid-sized, global organizations and government entities.

Velaspan

Velaspan

Velaspan design, deploy, and manage enterprise wireless networks and cybersecurity solutions for leading businesses and brands.

EyBrids

EyBrids

As a forward-thinking cybersecurity consulting firm, we believe that robust security is the foundation for innovation and growth in today’s digital landscape.

Two Candlesticks

Two Candlesticks

Two Candlesticks is a global cybersecurity service provider delivering high level consultancy, strategy, and frameworks to governments, regulators and midsized companies.