NEWS > Cybersecurity News


« Back to News

2015-06-29

The Coming Cyberpeace

The Normative Argument Against Cyberwarfare

2015-06-29

Data to Analyse Human Interaction with the Environment

Researchers are looking to the Internet of Things for new ways to analyze the relationship between humans & their environments.

2015-06-29

Google Enters Fray For Tesco Loyalty Unit

Tesco’s customer loyalty arm is for sale and Google are interested in buying. For $2 billion.

2015-06-29

How to Hire and Retain the Best IT Talent

How can a company without unlimited resources appeal to and maintain the workforce they need?

2015-06-29

Cambridge to Open Cyber Security Research Centre

The Cambridge Cloud Cybercrime Centre will focus on enhancing our understanding of cyber crime, security tools & techniques.

2015-06-29

NSA Has Reverse-Engineered Consumer Anti-Virus Software To Track Users

The NSA and GCHQ have put extensive effort into hacking popular security software products to “track users and infiltrate networks.”

2015-06-29

GCHQ's Surveillance of Rights Groups is Illegal

Although the interception was lawful, GCHQ retained emails for longer than it should have & violated its own internal procedures.

2015-06-29

The Dangers Of Internet-of-Things In Healthcare

Medical device connectivity to consumer technology raises alarming questions about privacy violation & intentional disruption.

2015-06-29

The Double-Edged Sword of Cyber Warfare

The Israeli army has recognized cyber weapons as a fourth dimension of warfare, alongside land, air and sea.

2015-06-29

FBI Alert: CryptoWall Ransomware Damage $18 Million

The most used vector are phishing emails that have a zipped attachment that claims to be a resume.

2015-06-29

Next World War - First, Cyberwar. Second, Shooting War

The more technologically powerful a nation is, the more technologically dependent that nation becomes. Cyberwar can level the playing field.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Online Business Systems

Online Business Systems

Online Business Systems is an information technology and business consultancy. We design improved business processes enabled with robust and secure information systems.

Achtwerk

Achtwerk

Achtwerk manufacture the security appliance IRMA for critical infrastructures and networked automation in production plants.

th4ts3cur1ty.company

th4ts3cur1ty.company

th4ts3cur1ty.company specialize in delivering intelligence lead adversary emulation purple teaming & the bespoke building of Security Operation Centers.

Thomsen Trampedach

Thomsen Trampedach

Thomsen Trampedach offers a tailored-made brand protection solution to each customer using a proprietary enforcement automation and reporting tool and a multilingual enforcement team.

High Wire Networks

High Wire Networks

High Wire Network’s Overwatch Managed Security Plaform-as-a-Service offers organizations end-to-end protection for networks, data, endpoints and users.

Prove Identity

Prove Identity

Prove (formerly Payfone) is a leader in mobile & digital identity authentication for the connected world.

Cyberfort Group

Cyberfort Group

Cyberfort exists to provide our clients with the peace-of-mind about the security of their data and the compliance of their business.

NorthStar

NorthStar

NorthStar provide the visibility needed to track and reduce risk through risk-based vulnerability management and vulnerability exploit prediction.

Maltego Technologies

Maltego Technologies

Maltego is a comprehensive tool for graphical link analyses that offers real-time data mining and information gathering. Applications include cybersecurity threat intelligence and incident response.

OccamSec

OccamSec

OccamSec is a leading provider in the world of cybersecurity. We provide accurate, actionable information to reduce risk and enable better informed decisions.

Sentar

Sentar

Sentar is a cyber intelligence company, applying advanced analytics and systems engineering expertise to protect our national security by securing mission-critical assets.

Redefine

Redefine

Redefine are Crypto-Native, Cyber Experts, and Blockchain Believers. We are here to make Web3 anti-fragile, safe and accessible to all.

PayPal Ventures

PayPal Ventures

PayPal Ventures invests in companies at the forefront of innovation in fintech, payments, commerce enablement, artificial intelligence, blockchain and cryptocurrency, regulatory and cyber technology.

CyTwist

CyTwist

CyTwist is an early warning attack detection platform that complement your existing security suite and provides your security teams with unique detection capabilities of stealth targeted attacks.

Canary Technology Solutions (Canary IT)

Canary Technology Solutions (Canary IT)

A Cloud, Cyber Security, Retail Solutions and Managed IT Services provider for over 25 years, we safeguard and revolutionise business through technology and foresight.

SeQure

SeQure

SeQure is a novel cybersecurity and data observability company that offers Fortune 100 and Governments a zero-trust service to continuously monitor large network environments.