NEWS > Cybersecurity News


« Back to News

2022-04-05

Cyber Security Lessons From The Ukraine War

Network Security Is Vital: The war in Ukraine serves as a clear example of how cyber warfare will play a major role in future conflicts. 

2022-04-08

The British Online Harms Bill Takes Shape

There will be new rules for social media and the regulator Ofcom will have powers to fine firms or block access to sites that fail to comply.

2022-04-05

Zelensky Deepfake Tells Ukrainians To ‘lay down arms’

Don't Be Fooled: The deepfake purports to show President Zelensky declaring that Ukraine has “decided to return Donbas” to Russia.

2022-03-30

Phishers Use Ukraine Invasion To Solicit Cryptocurrency

Malicious Emails: Phishers are impersonating legitimate aid organisations to steal donations intended for Ukrainian people. 

2022-04-04

Improving The Security Of Open Source Software

Open Source Software has changed the world of IT and its popularity is growing fast - one of many reasons why it needs to be properly protected.

2022-04-01

Germany Warns About Russian Anti-Virus Software

Germany's cyber security authority has issued a warning against using anti-virus software from the Russia-based service supplier Kaspersky.

2022-03-30

The Global Cyber Security Market Set To Grow By $190 Billion

Annual market growth well over 12% will be driven by increased demand from mobile usage, the IoT and many more Intenet users worldwide.

2022-03-23

The Use Of Intellectual Property As An Instrument Of War

Ukraine has taken the rare step to use intellectual property as a war weapon by leaking critical operating details of a Russian Nuclear plant.

2022-03-19

Georgia Must Bolster Resilience To Information Warfare

The invasion of Ukraine has important lessons for the ex- soviet republic of Georgia, which now urgently needs to tackle Russian disinformation.

2022-03-15

The Lessons Learned From Log4j

Open Source Software Has Its Drawbacks: When threats arise, some software support is more responsive than others. By Timothy Boles

2022-03-21

The App At The Frontline Of Information Warfare

Telegram enables Russian citizens to access first-hand information, news & video from war scenes in Ukraine, that run counter to Russian propaganda.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Pen Test Partners LLP

Pen Test Partners LLP

Pen Test Partners provides penetration testing, security assessment and training services.

GSMA - IoT Security Guidelines

GSMA - IoT Security Guidelines

GSMA has created a set of security guidelines for the benefit of service providers who are looking to develop new IoT products and services.

Uniscon

Uniscon

Uniscon is a leading provider of cloud security solutions in Europe.

TechDefence Labs

TechDefence Labs

TechDefence Labs provide pentesting and security assessment services for networks, web apps, mobile apps and source code reviews.

Secon Cyber Security

Secon Cyber Security

Secon Cyber Security is an Advanced Managed Security Services Provider with long standing experience of providing cyber security solutions to customers ranging from small to large enterprises.

Vaadata

Vaadata

Vaadata are experts in ethical hacking. We secure your web, mobile and IoT platforms.

Atlantic Security Conference (AtlSecCon)

Atlantic Security Conference (AtlSecCon)

Atlantic Security Conference is a non-profit, annual, information security conference located in Halifax, Nova Scotia, Canada.

Rocheston

Rocheston

Rocheston is an innovation company with cutting-edge research and development in emerging technologies such as Cybersecurity, Internet of Things, Big Data and automation.

InterGuard

InterGuard

As the pioneer for Unified Insider Threat Prevention and productivity monitoring tools, InterGuard offers on premise and SaaS-based services that are easily available and affordable.

Adaptive Shield

Adaptive Shield

Addaptive Shield - Complete Control For Your SaaS Security. Proactively find and fix weaknesses across your SaaS platforms.

Security Management Partners (SMP)

Security Management Partners (SMP)

Security Management Partners (SMP) is a trusted partner to financial services, healthcare and businesses that need to manage their information, securely.

cleverDome

cleverDome

cleverDome has created the first community built and proven model that redefines the standards for protecting the most confidential data and information of consumers in the cloud.

CyberGate Technologies

CyberGate Technologies

CyberGate Technologies is a world-class, customer focus cyber security service and consultancy company operating the UK, Europe, Middle East, and Africa.

Olympix

Olympix

Dev-first Web3 security that starts at the source. Olympix is a pioneering DevSecOps tool that puts security in the hands of the developer by proactively securing code from day one.

Sardine

Sardine

Sardine is a leader in financial crime prevention. Using unparalleled device intelligence and behavior biometrics, Sardine applies machine learning to detect and stop fraud before it happens.

aiComply

aiComply

aiComply's AI-driven platform offers automated intelligence for an efficient cybersecurity compliance workflow, eliminating onerous manual and time-consuming paperwork.