NEWS > Cybersecurity News


« Back to News

2015-07-02

Court Briefly Returns NSA Surveillance Program

Has The USA Freedom Act really put an end to NSA's domestic bulk metadata collection? It seems not..

2015-07-02

Europol Tackles Cybercrime Ring

The cybercriminals attacked online banking systems, infecting machines, harvesting bank credentials & laundering money.

2015-06-30

Cyberwars Between Nations Are Difficult to Prove

The OPM attack is merely the latest of a number of high-profile hacking attacks and attributing blame is a challenge.

2015-06-30

Financial Institutions Face Increasing Cyber Attacks

Going Under: Cyber attacks on financial institutions are relentless in their frequency and severity.

2015-06-29

The Cybersecurity Company Helping Sony Fend Off Hackers

Bad news for everyone else is excellent news for those in the business of fighting such cyber villains.

2015-06-29

Who’s Afraid Of Superhumanity?

What’s to stop a small group of people, enhanced genetically & beyond the average human, from winning at the game of life?

2015-06-29

What a Cyber War Arsenal Looks Like

Cyber warfare is no longer just a futuristic threat - now it is a real one.

2015-06-29

China Security Bill Calls for ‘Cyber Sovereignty’

The bill calls for “cultural security” & improving socialist education to prevent the “infiltration of unhealthy culture.”

2015-06-29

The Coming Cyberpeace

The Normative Argument Against Cyberwarfare

2015-06-29

Data to Analyse Human Interaction with the Environment

Researchers are looking to the Internet of Things for new ways to analyze the relationship between humans & their environments.

2015-06-29

Google Enters Fray For Tesco Loyalty Unit

Tesco’s customer loyalty arm is for sale and Google are interested in buying. For $2 billion.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Proofpoint

Proofpoint

Proofpoint provide the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, social media and mobile messaging.

Conference-Service

Conference-Service

Conference-Service provides a categorised calendar of conferences and events, including Information Security & Privacy.

ClearDATA

ClearDATA

The ClearDATA Managed Cloud protects sensitive healthcare data using purpose-built DevOps automation, compliance and security safeguards, and healthcare expertise.

SolutionsPT

SolutionsPT

SolutionsPT enables customers to strengthen their Operational Technology (OT) network to meet the ever increasing demand for performance, availability, connectivity and security.

World Congress on Industrial Control Systems Security (WCICSS)

World Congress on Industrial Control Systems Security (WCICSS)

The World Congress on Industrial Control Systems Security (WCICSS) is focused on emerging trends in protection of industrial control systems.

Exire Technologies

Exire Technologies

Exire Technologies is comprised of a team of professionals who are specialised in cybersecurity and a value added reseller and integrator of ICT security systems.

CyberCX

CyberCX

CyberCX provides services from strategic consulting, security testing and training to world-class managed services and engineering solutions.

Kocho

Kocho

Kocho (formerly TiG) is a provider of identity and access, cyber security, cloud transformation, and managed IT services.

Boxphish

Boxphish

Boxphish provides a proven solution to reduce Human Error and Cyber Human Risk via automated learning journeys and intelligent phishing simulations.

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries is America’s largest military shipbuilding company and a provider of professional services to partners in government and industry.

Vanta

Vanta

Vanta helps companies scale security practices and automate compliance for the industry’s most sought after standards - SOC 2, ISO 27001, HIPAA, GDPR, and other security and privacy frameworks.

NetCentrics

NetCentrics

NetCentrics leverages an innovative, agile, ‘what’s-next’ approach to our customers’ IT and cyber challenges.

Fletch

Fletch

Fletch’s AI tracks the evolving cybersecurity threat landscape by reading and interpreting every threat article every day and matching those threats to a company’s exposure.

Ironblocks

Ironblocks

Ironblocks is a pioneering cybersecurity firm that specializes in delivering comprehensive, end-to-end security solutions for the rapidly evolving Web3 ecosystem.

UltraViolet Cyber

UltraViolet Cyber

UltraViolet is an industry leading tech-enabled managed security services company.

Invary

Invary

Invary's expert Runtime Integrity solution, powered by NSA-licensed technology, verifies the security and confidentiality of your system.