NEWS > Cybersecurity News


« Back to News

2015-05-22

UK Rewrites Hacking Laws to Give GCHQ Immunity

Changes to the Computer Misuse Act were secretly introduced over a year ago.

2015-05-22

UK Rewrites Hacking Laws to Give GCHQ Immunity

Changes to the Computer Misuse Act were secretly introduced over a year ago.

2015-05-22

Device to protect your vehicle from “Sticky bombs”

’Advanced Car Protection’ will detect any hidden device placed under a parked car and will issue an alert in real time.

2015-05-22

Snowden Sees Victory – But it’s From a Distance

For an international fugitive hiding out in Russia from American espionage charges, Edward J. Snowden gets around.

2015-05-22

German BND Intelligence Cooperation with NSA has Actually Expanded.

German and US intelligence agencies are cooperating on a scale and in ways that are only now becoming apparent.

2015-05-19

Nine Strange Flying Robots from the 2015 Drone Show

The future of drone design is an area with huge importance for companies and for the military. At the recent Unmanned Systems 2015 Show that future was on display.

2015-05-19

US Colleges Open Networks in a Cyberwar

A string of attacks that attempt to exploit weaknesses that are unique to the way colleges operate.

2015-05-22

Countering Cyber Criminals with Biometrics

Biometrics, Smartphones, fingerprint readers; the financial services sector is beginning to to invest in new security measures.

2015-05-20

Predictions for cyber-crime in 2015 and how the Security Industry is Responding

Last year was littered with high-profile cyber threats and security breaches. In 2015, the frequency and severity of cyber-attacks will increase.

2015-05-20

New York Backs Bitcoin but other US States Won’t!

itBit becomes the first Bitcoin exchange to be fully regulated in the United States.

2015-05-20

NSA Snowden is a 'hero' but not in the UK

Edward Snowden and the film on his leaks, Citizenfour, were celebrated at an event in London, but has the UK really got the message on privacy?

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

AlgoSec

AlgoSec

The AlgoSec platform enables the world’s most complex organizations to gain visibility, reduce risk and process changes at zero-touch across the hybrid network.

CloudEndure

CloudEndure

CloudEndure offers Disaster Recovery and Continuous Replication for the Cloud.

High Technology Crime Investigation Association (HTCIA)

High Technology Crime Investigation Association (HTCIA)

HTCIA was formed to provide education and collaboration to our global members for the prevention and investigation of high tech crimes.

Avatu

Avatu

Avatu specialise in providing clients the advice, technology and tools they need to fight cyber and insider threats.

Cyber Security For Critical Assets (CS4CA)

Cyber Security For Critical Assets (CS4CA)

Cyber Security For Critical Assets is a global series of summits focusing on cyber security for critical infrastructure.

Applied Science and Technology Research Institute Company Limited (ASTRI)

Applied Science and Technology Research Institute Company Limited (ASTRI)

ASTRI's mission is to enhance Hong Kong’s competitiveness in technology-based industries through applied research in areas including Security & Data Sciences which encompasses cybersecurity.

Netacea

Netacea

Netacea provides a revolutionary bot management solution that protects websites, mobile apps and APIs from malicious attacks such as scraping, credential stuffing and account takeover.

drie

drie

drie is an end-to-end cloud services company based in Bahrain, Dubai and London. We enable businesses to adopt, scale on and build for cloud.

Defensity

Defensity

Defensity offer bespoke & pre packaged IT Security Solutions for Small business to help companies reduce overall IT related risk.

Immuta

Immuta

Immuta empowers data engineering and operations teams to automate data governance, security, access control & privacy protection.

Wing Security

Wing Security

Wing fosters a stronger security culture by engaging SaaS end-users and enabling easy communication with security teams.

Inversion6

Inversion6

Inversion6 (formerly MRK Technologies) is a cybersecurity risk management provider that offers custom security solutions.

D.med Software

D.med Software

D.med Software is a company with a focus on cybersecurity for embedded software and cloud applications for the medical industry.

Manifest

Manifest

Manifest is a cybersecurity company dedicated to helping enterprises secure their software supply chains.

DefectDojo

DefectDojo

DefectDojo is a DevSecOps and vulnerability management tool.

Astra Cybertech

Astra Cybertech

At Astra Cybertech, we're more than just cybersecurity experts - we're your partners in safeguarding your digital assets.