NEWS > Cybersecurity News


« Back to News

2015-08-14

ECHELON Has Been Watching You All Your Life

40 Years Later: PRISM and XKeyscore are the current manifestations of ECHELON

2015-08-10

Global Spy System ECHELON Confirmed by Snowden Leak

History by Duncan Campbell: Leaked Snowden files finally confirm the existence of the ECHELON intercept project.

2015-08-08

Could Cyberwar Knock Us Back to the Stone Age?

If there were a major cyberwar, just how bad would it be? Could modern civilization survive? A thought experiment by David Gewirtz.

2015-08-07

Internet of Things Unlocks Revenue Opportunities

Business is just beginning to see the potential of IoT & Big Data to create value.

2015-08-07

Spyware Demo Shows how Spies Hack Mobiles

Stolen Hacking Team mobile hacking software was recently published on the web. It works.

2015-08-06

Cyber Wars Are Good For Tech Businesses

Trending Higher as Investors Pile In on Cyber Security. Two Companies To Watch Out For? Cyber Ark & Palo Alto.

2015-08-06

MH370 may have been deliberately taken off course

US intelligence report suggests the missing Malaysia Airlines Flight MH370 may have been deliberately flown off course.

2015-08-05

How Analytics Will Influence Connected Cars

Connected services like in-car Wi-Fi are driving the adoption of cloud-based vehicle platforms enabled by embedded 4G broadband.

2015-08-04

Data Breaches Boost Funding for Cybersecurity Startups

In the first half of 2015 venture firms invested $1.2 billion in cybersecurity startups.

2015-08-04

SurfWatch Labs Rolls Out Dark Web Intelligence Service

SurfWatch collects sensitive cyber intelligence from the underground on threats relevant to a specific customer.

2015-08-04

Machine 2 Machine: Where will that leave us?

When machines communicate directly with each other without a human intermediary – will they prefer their own company?

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ACME Communications

ACME Communications

ACME Communications specialises in the field of data centre, implementation, maintenance & operation and all aspects of other IT service.

Software Factory

Software Factory

Software Factory develops custom-built high-performance software solutions and products for applications including industrial cyber security.

AGAT Software

AGAT Software

AGAT Software is an innovative security provider specializing in external access authentication and data protection solutions.

Nubo Software

Nubo Software

Nubo’s Virtual Mobile Infrastructure creates a virtual corporate device on your employee smartphones and tablets. Enable unlimited mobility without leaving any data at risk.

Shape Security

Shape Security

Shape Security provide best-in-class defense against malicious automated cyberattacks on web and mobile applications.

Cycuity

Cycuity

Cycuity (formerly Tortuga Logic) is a cybersecurity company that is transforming the way we secure silicon with comprehensive hardware security assurance.

Aptible

Aptible

Aptible is a Platform as a Service (PaaS) that gives startups everything developers need to launch and scale apps and databases that are secure, reliable, and compliant.

Checksum Consultancy

Checksum Consultancy

Checksum Consultancy specializes in Information security, Risk management, and IT governance.

Altaro Software

Altaro Software

Altaro provide backup solutions that are intuitive, easy to use, well-priced and backed by outstanding 24/7 support as part of the package.

National CyberWatch Center - USA

National CyberWatch Center - USA

National CyberWatch Center is a cybersecurity consortium working to advance cybersecurity education and strengthen the national workforce.

Cohesity

Cohesity

Cohesity radically simplifies the way businesses back up, manage, protect, and extract value from their data—in the data center, at the edge, and in the cloud.

DataExpert Singapore

DataExpert Singapore

DataExpert Singapore provide solutions and services in the areas of Digital Forensics, Data Recovery, Data Duplication, Data Degaussing & Wiping, Data Destruction, and IT Disposal.

Akito

Akito

Akito was set up to become a point of reference in the ICT market for issues related to Security and in particular Cyber Security.

BATM Advanced Communications

BATM Advanced Communications

BATM Advanced Communications is a leading provider of real-time technologies for networking and cyber security solutions.

Redpoint Cybersecurity

Redpoint Cybersecurity

Redpoint Cybersecurity is a human-led, technology-enabled managed cybersecurity provider specializing in Digital Forensics, Incident Response and proactive cyberattack prevention.

Whisper

Whisper

Whisper was built to shift cybersecurity from reactive to predictive. Our mission is to stop cybercrime by helping organizations anticipate threats before damage occurs.