NEWS > Cybersecurity News


« Back to News

2015-08-07

Internet of Things Unlocks Revenue Opportunities

Business is just beginning to see the potential of IoT & Big Data to create value.

2015-08-07

Spyware Demo Shows how Spies Hack Mobiles

Stolen Hacking Team mobile hacking software was recently published on the web. It works.

2015-08-06

Cyber Wars Are Good For Tech Businesses

Trending Higher as Investors Pile In on Cyber Security. Two Companies To Watch Out For? Cyber Ark & Palo Alto.

2015-08-06

MH370 may have been deliberately taken off course

US intelligence report suggests the missing Malaysia Airlines Flight MH370 may have been deliberately flown off course.

2015-08-05

How Analytics Will Influence Connected Cars

Connected services like in-car Wi-Fi are driving the adoption of cloud-based vehicle platforms enabled by embedded 4G broadband.

2015-08-04

Data Breaches Boost Funding for Cybersecurity Startups

In the first half of 2015 venture firms invested $1.2 billion in cybersecurity startups.

2015-08-04

SurfWatch Labs Rolls Out Dark Web Intelligence Service

SurfWatch collects sensitive cyber intelligence from the underground on threats relevant to a specific customer.

2015-08-04

Machine 2 Machine: Where will that leave us?

When machines communicate directly with each other without a human intermediary – will they prefer their own company?

2015-08-04

ISIS's Threat: A Cyber War Against America

ISIS has over 20,000 English-language Twitter followers "that...makes it harder to determine who's going to succumb to the propaganda."

2015-08-04

3D Xpoint Memory: Faster-than-flash Storage

3D Xpoint is a type of "persistent memory" - meaning it retains data stored on it when the power is switched off, unlike RAM.

2015-08-04

For Ransom, Bitcoin Replaces the Bag of Bills

Criminals like the virtual currency because it can be held in a digital wallet & is not registered with any government or financial authority.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

SecurePay

SecurePay

SecurePay is Australia's premier payment gateway, with a range of secure online payment solutions for online retailers, SMEs and enterprise businesses.

SCADAfence

SCADAfence

SCADAfence offers cutting edge cybersecurity solutions designed to ensure the operational continuity of industrial (ICS/SCADA) networks.

TÜV Informationstechnik (TÜViT)

TÜV Informationstechnik (TÜViT)

TÜViT is a leading service provider in the IT sector offering unbiased and independent tests and certifications of IT products, hardware, software, systems and processes.

Police Digital Security Centre (PDSC)

Police Digital Security Centre (PDSC)

PDSC is a not-for-profit organisation, owned by the police, that works across the UK in partnership with industry, government, academia and law enforcement.

Iron Bow Technologies

Iron Bow Technologies

Iron Bow Technologies is a leading IT solution provider dedicated to successfully transforming technology investments into business capabilities for government, commercial and healthcare clients.

JaCIRT

JaCIRT

JaCIRT is the national Cyber Incident Response Team for Jamaica, established to deliver on the mandate outlined in the GoJ’s National Cyber Security Strategy.

Zephyr Project

Zephyr Project

The Zephyr Project strives to deliver the best-in-class RTOS for connected resource-constrained devices, built to be secure and safe.

Easy Dynamics

Easy Dynamics

Easy Dynamics is a leading technology services provider with a core focus in Cybersecurity, Cloud Computing, and Information Sharing.

Apollo Information Systems

Apollo Information Systems

Apollo is a value-added reseller that provides our clients with the complete set of cybersecurity and networking services and solutions.

Brightsolid

Brightsolid

Brightsolid are experts in Hybrid Cloud. We design, build and manage secure, scalable cloud environments that meet customers’ business ambitions.

Fireblocks

Fireblocks

Fireblocks is a digital asset security platform that helps financial institutions protect digital assets from theft or hackers.

Xoriant

Xoriant

Xoriant is a technology leader and execution partner throughout the Build, Run and Transform lifecycle for companies that create and use technology products.

Confidencial

Confidencial

Confidencial is a provider of solutions that help organizations secure their most sensitive information, regardless if that information exists inside or is shared outside the organization.

Zeron

Zeron

Zeron build bridges between security teams and top management. Our platform unifies your cyber risk posture seamlessly, encompassing threat insights and quantifiable risk scenarios.

Spec

Spec

Spec is the only no-code orchestration platform that protects enterprise fraud defenses from being blocked, bypassed, and manipulated by modern attack tactics.

Cyber Explorers

Cyber Explorers

Cyber Explorers is a fun, free and interactive learning platform for future digital superstars. An exciting addition to UK curriculum delivery or after school activities.