NEWS > Cybersecurity News


« Back to News

2015-09-30

UN Calls On Social Media to Act Against ‘Misuse’ by Extremists

A UN panel has called for Internet & social media companies to respond to the exploitation of their services by al-Qaida and violent extremists.

2015-09-30

AT&T helped NSA Spy on Domestic Citizens

The relationship between AT&T and the NSA is said to be "highly collaborative," thanks to the company's "extreme willingness to help."

2015-10-02

Cyberwar Right Here, Right Now...

The World We Live In Now: Where cyber attacks are real and cyber wars could cause immeasurable damage.

2015-09-30

Zeus Arrests and SpyEye Group is Taken Down

Europol take down a cybercrime ring which infected tens of thousands of computers with Zeus and SpyEye malware and stole $millions.

2015-09-29

The Differences Between Targeted Attacks and Advanced Persistent Threats

Very different and equally nasty, dealing with either of them calls for prudent strategy and dedication.

2015-09-29

8 Ways to Fend Off Spyware

Spyware, malware, phishing and, more recently, ransomware - the list of online threats can be confusing and daunting.

2015-09-29

Cyber Liability Insurance’s Data Problems

Security leaders need to understand their role in helping the insurance industry by providing greater transparency.

2015-10-05

Cyber Peace? The U.S and China Reach an ‘Understanding’

The two leaders agree neither government will knowingly support the theft of corporate intellectual property. By Jamie Collier

2015-10-05

Insiders Responsible for 43% of Data Breaches

Among companies experiencing data breaches, internal actors were responsible for 43% of data loss, half of which was intentional, half accidental.

2015-09-28

Xi Jinping At Seattle Tech Summit

Microsoft co-founder Bill Gates is one of the many US tech leaders Chinese President Xi Jinping is meeting with during his visit to Seattle.

2015-09-28

The U.S Is Losing the Cyber War

The Hacking of America: The Office of Personnel Management Hack comes after years of the U.S. passivity despite repeated digital attacks.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

TCDI

TCDI

TCDI specializes in computer forensics, eDiscovery and cybersecurity services.

Gulf Computer Services Co (GCSC)

Gulf Computer Services Co (GCSC)

Gulf Computer Services is a major player in the field of networking & Communication solutions for emerging industries such as Internet Services and Information Technology in Saudi Arabia.

Maven Technologies

Maven Technologies

Maven Technologies specialize in secure data destruction, electronics recycling, asset management, and highly detailed reporting.

ZEBOX

ZEBOX

ZEBOX is an international incubator & accelerator of innovative startups. Focus is on Transport/Logistics and Industry X.0 including technologies such as AI, Blockchain and Cybersecurity.

iHLS Startups Accelerator

iHLS Startups Accelerator

iHLS Accelerator is the first startup accelerator in the world in the security and homeland security field.

AUREA Technology

AUREA Technology

The photon counter SPD_OEM_NIR from AUREA Technology is designed for quantum key distribution at telecom wavelengths.

Hawk Network Defense

Hawk Network Defense

HAWK.io is the First Fully Automated, Multi-Tenant, Cloud-Based, MDR Service Company.

Navixia

Navixia

As a leading Swiss IT security specialist, Navixia offers a global and pragmatic approach to information security.

KETS Quantum Security

KETS Quantum Security

KETS harnesses the properties of quantum mechanics to solve challenging problems in randomness generation and secure key distribution and enable ultra secure communications.

M2MD Technologies

M2MD Technologies

M2MD Technologies offers solutions optimized for cellular IoT that provide stronger security, reduced costs, enhanced user experience, and ultimately generates higher returns for stakeholders.

Cheops Technology

Cheops Technology

Cheops is a specialist in IT Business Technology Services. We help SMEs and large companies build, optimize and manage their IT so they can focus on their core business.

PKI Solutions

PKI Solutions

PKI Solutions offers Public Key Infrastructure (PKI) products, services, and training to help ensure the security of organizations now and in the future.

RecoLabs (Reco)

RecoLabs (Reco)

Reco empowers organizations to discover their SaaS applications, identities, and data, control access and prevent the risk of exposure.

UM6P Ventures

UM6P Ventures

UM6P Ventures is an African based early-stage ventures firm operating two funds; a Digital Transformation fund and a Deeptech Ventures fund.

DACTA Global

DACTA Global

DACTA was established with the aim of simplifying the perception of complexity surrounding digital security challenges and solutions.

Red Alpha Cybersecurity

Red Alpha Cybersecurity

At Red Alpha, we specialize in recruiting and rigorously training individuals passionate about cybersecurity.