NEWS > Cybersecurity News


« Back to News

2015-07-07

Why Police Agencies Can't Communicate in a Crisis

Incompatible communications systems, databases and priorities in the U.S. Too little technical know-how in the U.K.

2015-07-07

ICWATCH Database Gathers the CV’s of 27,000 Intelligence Employees

The Open Source ICWATCH database of intelligence community workers is fully searchable.

2015-07-10

Cyber Security in China: New Challenges to the West

China’s Internet & telecoms giants are very successful but the Chinese IT market is getting more challenging for western businesses.

2015-07-07

Offensive Cyber Security Changes the Industry

Opinion byMatthew Rosenquist

2015-07-07

NSA: 'Backdoors are a Bad Idea - Give us a Front Door Key'

The idea seems to be that only when all the agencies holding portions of a key decide to use it together will decryption become possible.

2015-07-07

‘Great Cannon’ China’s Weapon Shoots Down Internet Sites

‘Great Cannon’ is a powerful tool built to intercept data and redirect it to specific websites.

2015-07-07

U.S. Government Support Insurers Protection from Cyber Hacks

The U.S government has the backs of insurers & their clients as they adapt to the fast-evolving threat of cyber attacks,

2015-07-07

Trade Groups Protest US Block on Digital Imports

Internet Restrictions: US International Trade Commission can block digital goods, in additional to physical ones, from being imported.

2015-07-06

BBC Forgotten List 'sets a precedent'

The links were removed as part of the "right to be forgotten" ruling put in place by the European Court.

2015-07-06

Google’s Robot Intelligence Help Desk

Google's system learns to model language & conversation based on examples in public documentation.

2015-07-06

Online Anonymity Box Distances Your IP Address

In the game of anonymity-versus-surveillance online, the discovery of the user’s IP address usually means game over.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyber Defense Agency (CDA)

Cyber Defense Agency (CDA)

Cyber Defense Agency is a premier professional services firm specializing in cyber security, computer network defense, and information security.

DataProtect

DataProtect

DataProtect is a specialized information security company providing consultancy, information management, integration and training services.

Cyber Security Malta

Cyber Security Malta

Cyber Security Malta is part of Malta's National Cyber Security Strategy which aims to combat cybercrime, strengthen national cyber defence and provide cyber security awareness and education.

Penningtons Manches Cooper

Penningtons Manches Cooper

Penningtons Manches Cooper is a leading UK law firm providing high quality legal advice in areas including Data Protection, Cyber Security and Cyber Crime.

Connectitude

Connectitude

Connectitude IIoT Platform ™ is a complete solution for industrial IIoT.

ADL Process

ADL Process

ADL Process offer secure data destruction, certified product destruction and responsible electronics recycling services to businesses and institutions.

Apozy

Apozy

Apozy replaces a secure web gateway to nullify phishing, malware and impersonation attacks.

Cyber Smart Defense

Cyber Smart Defense

Cyber Smart Defense is a specialist provider of penetration testing services and IT security audits.

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

AWS Marketplace eBook: Optimizing your cloud deployments to accelerate cloud activities, reduce costs, and improve customer experience.

AdvIntel

AdvIntel

AdvIntel is a next-generation threat prevention and loss prevention company launched by a team of certified investigators, reverse engineers, and security experts.

UK Cyber Cluster Collaboration (UKC3)

UK Cyber Cluster Collaboration (UKC3)

UKC3 has been launched to support Cyber Clusters and encourage greater collaboration across regions and nations of the UK.

The Security Bulldog

The Security Bulldog

The Security Bulldog distills and assimilates open source cyber intelligence to enable security teams to understand threats more quickly, make better decisions, and accelerate detection and response.

SYN Ventures

SYN Ventures

SYN Ventures invests in disruptive, transformational solutions that reduce technology risk.

ThreatNix

ThreatNix

ThreatNix is a tight knit group of experienced security professionals who are committed to providing competent cybersecurity solutions that adhere to international standards.

Security Solutions Services (S-3)

Security Solutions Services (S-3)

S-3 specialize in crafting tailored network design, security hardware, software, and storage solutions for businesses of all sizes.

Blue Mantis

Blue Mantis

Blue Mantis is a security-first, IT solutions and services provider with a 30+ year history of successfully helping clients achieve business modernization.