NEWS > Cybersecurity News


« Back to News

2015-08-11

Inside the FBI Cyber Division

The biggest threats the FBI's new agents will face are not the ones they will confront on the streets, but the ones online.

2015-08-11

Will Robots Eliminate Many Humans From the Workplace?

The fear of millions of jobs being automated out of existence by robots is real. Here's how it will change the world -- for the better.

2015-08-10

The UK Government is Offering £5000 Cyber Secure Vouchers to SMEs

A campaign to improve understanding & cyber-strategy with a financial incentive scheme for SMEs adopting the right controls and solutions.

2015-08-10

Interpol is Training Police to Fight DarkNet Crime

Interopol run a five-day course on Tor hidden services, illegal marketplaces & crypto currencies to investigate crimes on the DarkNet.

2015-08-10

Medical Devices are Vulnerable to Hackers

Cars. Planes. Phones. Now vulnerabilities in the infusion devices that hospitals use to administer intravenous drugs are identified.

2015-08-10

Smart Homes and the Data Underclass

Internet of Things: Could insurance companies use our own IoT data against us?

2015-08-10

90% of Android Devices Are DoS Vulnerable

A second denial-of-service (DoS) vulnerability impacting the majority of Android devices in use.

2015-08-10

Cyber Extortion: A Growth Industry

The prevailing wisdom in law enforcement has been that it is a bad idea to negotiate with extortionists. Is it?

2015-08-14

ECHELON Has Been Watching You All Your Life

40 Years Later: PRISM and XKeyscore are the current manifestations of ECHELON

2015-08-10

Global Spy System ECHELON Confirmed by Snowden Leak

History by Duncan Campbell: Leaked Snowden files finally confirm the existence of the ECHELON intercept project.

2015-08-08

Could Cyberwar Knock Us Back to the Stone Age?

If there were a major cyberwar, just how bad would it be? Could modern civilization survive? A thought experiment by David Gewirtz.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Miradore

Miradore

Miradore is a software company specializing in effective, cloud-based device management. Our goal is to help IT Service Providers and IT departments secure and control devices.

Council of Europe Convention on Cybercrime

Council of Europe Convention on Cybercrime

The Council of Europe helps to protect societies worldwide from the threat of cybercrime through the Convention on Cybercrime.

Seavus Accelerator

Seavus Accelerator

Seavus Accelerator's goal is to create an enabling and stimulating environment for start-ups growth and provide continuous high quality acceleration and investment support.

689cloud

689cloud

689Cloud is a cloud content collaboration platform that allows users to protect, track, and control files AFTER they have been shared.

Techfusion

Techfusion

Techfusion is a cyber security research and consulting firm focusing on digital forensics and data recovery.

Hex-Rays

Hex-Rays

Founded in 2005, privately held, Belgium based, Hex-Rays SA focuses on the development of fast, stable, and robust binary analysis tools for the IT security market.

CyberAcuView

CyberAcuView

CyberAcuView is a company dedicated to enhancing cyber risk mitigation efforts across the insurance industry.

NASK SA

NASK SA

NASK SA is an integrator of telecommunications services. We provide advanced ICT security services, collocation and hosting, data centre services, and build corporate networks.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Enzen

Enzen

Enzen is a global knowledge practice that provides consulting, technology, engineering, operating and innovation services to the energy and utility sectors.

Privacy Compliance Hub

Privacy Compliance Hub

Privacy Compliance Hub provide an easy to use platform with a comprehensive data protection compliance programme including training, information, templates and reporting.

Buchanan Technologies

Buchanan Technologies

Buchanan Technologies is a leading IT consulting and outsourcing services firm. Our methodology transforms everyday technology investments into streamlined, secure and scalable solutions.

Ermes

Ermes

Ermes – Intelligent Web Protection provides companies with a solution that effectively secures them against web threats.

Tidelift

Tidelift

Tidelift provides the tools, data, and strategies that help organizations assess risk and improve the health, security, and resilience of the open source used in their applications.

Unified Infotech

Unified Infotech

Unified Infotech is a trusted partner for IT and software solutions dedicated to empowering businesses.

SECUREU

SECUREU

At SECUREU, we protect growing businesses against cyberattacks by proactively implementing best security practices, fixing existing security vulnerabilities, and increasing cyber awareness.