NEWS > Cybersecurity News


« Back to News

2015-11-10

Cyber Attack, CyberCrime, CyberWarfare – CyberComplacency

Reading List: An in-depth reference work covering Cyber Attacks from motivation, identification, analysis & mitigation. By Mark Osborne.

2015-11-10

British Police Want Access to UK's Entire Web Browsing History

Retention of weblog data for Police inspection is "perhaps the most contentious and confused aspect of communications data retention".

2015-11-10

A Threat No One Is Talking About - Attack On the Power Grid

The US power distribution system comprises three power grids generating electricity which are vulnerable to attack by a sophisticated hacker.

2015-11-10

Waging Cyberwar In Peacetime

The internet makes civilian targets the easiest to strike and in many instances causalities are not immediate.

2015-11-10

Drone Carrying Drugs Crashes at a US Prison

The first attempt to smuggle contraband into a prison with an unmanned aerial vehicle.

2015-11-09

U.S Tech Companies Shouldn't Give China Code

China has been asking US technology companies to share proprietary information, ostensibly for security purposes.

2015-11-09

Bank of England Partners With US for Cyberattack Simulation

The Bank of England is set to simulate a major cyberattack in order to test the security protocols being employed by the finance industry.

2015-11-07

New UK Surveillance Bill Appears In The Wake of Snowden

Is the proposed new legislation a gross intrusion of privacy or a sensible anti-terrorism measure?

2015-11-06

Russian Air Crash Investigation Changes The Encryption War

If intercepted communications prove an ISIS bomb caused the crash in Egypt, it could be just the boost surveillance state advocates need.

2015-11-06

NATO’s role in the cyber domain is unclear.

Would NATO go to war in response to a cyber-attack against one of it's members? Opinion By Jamie Collier.

2015-11-04

IBM Watson's Goodbye To Privacy

So much data that it can no longer be made sense of without artificial intelligence. Which has consequences for human privacy.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

WhiteHat Security

WhiteHat Security

WhiteHat’s products enable customers to “Hack Yourself First” so that they gain a greater understanding of the actual risk to their business.

Australian Signals Directorate (ASD)

Australian Signals Directorate (ASD)

The Australian Signals Directorate is an intelligence agency in the Australian Government Department of Defence.

French Expert Center Against Cybercrime (CECyF)

French Expert Center Against Cybercrime (CECyF)

CECyF is a centre of excellence for countering cybercrime in France.

PartnerRe

PartnerRe

PartnerRe provides multi-line reinsurance to insurance companies on a worldwide basis. Services include Cyber Risk.

ThreatSTOP

ThreatSTOP

ThreatSTOP is a cloud-based automated threat intelligence platform that converts the latest threat data into enforcement policies to stop attacks before they become breaches.

Quantum Generation

Quantum Generation

Quantum Cyber Security for a new age of communications. We are developing the largest decentralized orbital, and ground quantum mesh network based on blockchain technology.

ditno

ditno

ditno uses machine learning to help you build a fully governed and micro-segmented network. Dramatically mitigate risk and prevent lateral movement across your organisation – all from one centralised

ECIT

ECIT

ECIT is your preferred provider of finance and IT services. We believe in the value of combining financial and IT services to streamline and improve the operation of your business.

Fescaro

Fescaro

FESCARO is a trusted cybersecurity partner for global automakers and their partners, helping them transition to software-defined vehicles (SDVs) with tailored automotive software solutions.

L&T Technology Services (LTTS)

L&T Technology Services (LTTS)

L&T Technology Services Limited (LTTS) is a global leader in Engineering and R&D (ER&D) services.

AKIPS

AKIPS

AKIPS develops the world's most scalable network and infrastructure monitoring software, delivered as a turn-key software appliance.

appNovi

appNovi

appNovi inventories everything to map the attack surface, identify missing security agents, and prioritize vulnerabilities based on exposure.

PDI Technologies

PDI Technologies

PDI Technologies helps convenience retail and petroleum wholesale businesses around the globe increase efficiency and profitability by securely connecting their data and operations.

OmniIndex

OmniIndex

OmniIndex PostgresBC is the only commercial solution allowing you to keep your most sensitive and critical data encrypted while analyzing it. Structured and unstructured.

Clumio

Clumio

Clumio provides autonomous backup and recovery for critical cloud data.

CIS Secure

CIS Secure

CIS Secure is an innovator, integrator and expert advisor supporting the broadest portfolio of powerful, mission-specific C5ISR communications and cybersecurity solutions.