NEWS > Cybersecurity News


« Back to News

2020-05-27

Internet Cable To Encircle Africa

2Africa: Facebook is building a 23,000-mile undersea cable to supply fast Internet to 16 countries that will triple Africa’s Internet capability.

2020-05-27

Cyber Attacks On British Business Every Minute

Connected businesses in the UK experienced on average 157,000 attacks each in the first quarter, which equates to more than one every minute.

2020-05-26

Hacked ChatBooks Photo Data For Sale

Data consisting of 15 million user records has been stolen from a photo print service company and can now be found for sale on the Dark Web.

2020-05-26

Hackers Succeed In Doing More Harm Than Insiders

Verizon's 2020 Data Breach Report finds that 70% of breaches derive from external action, with organised crime accounting for 55% of these.

2020-05-25

The Victims Of Cybercrime In Britain

An authoritative study into the effects of cyber crime in Britain recommends changes throughout the current system to better protect victims.

2020-05-22

Cyber Attacks Knock 7.2% Off The Average Company Share Price

Data breaches have big consequences for public companies. Lost business, regulatory fines, remediation costs and a big impact on share price.

2020-05-20

Paying Cybercriminals A Ransom Will Double Your Recovery Costs

Paying ransom appears to be an effective way of getting stolen data restored, but that is an illusion. It is much cheaper to invest in strong defences.

2020-05-20

Employees Lack Cyber Protection In Lockdown

Organisations forced to work remotely due to COVID-19 are risking unprecedented cyber security threats from malicious actors.

2020-05-18

Businesses Are Lining Up To Deploy AI

Artificial Intelligence is right on trend with US business users, who are expecting to benefit most from improved management decision-making.

2020-05-18

‘We Hacked Your Website’ Blackmail Scam

The message threatens to leak or sell your website database, destroy your online reputation and de-index your site in search engines. Its a lie.

2020-05-15

Coronavirus Phishing Scams

Cybercriminals are taking full advantage of the pandemic and phishing is a current favorite tool of coronavirus scammers. By Caleb Danziger

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Digital Forensics Inc (DFI)

Digital Forensics Inc (DFI)

Digital Forensics Inc. is a nationally recognized High Technology Forensic Investigations and Information System Security firm

Virtual Security

Virtual Security

Virtual Security provides solutions in the field of managed security services, network security, secure remote work, responsible internet, application security, encryption, BYOD and compliance.

REVI-IT

REVI-IT

REVI-IT is a Danish state-owned audit firm focusing on enterprise IT business processes and compliance,

Silverskin Information Security

Silverskin Information Security

Silverskin is a cyber attack company that specializes in having knowledge of the attacker's mindset to identify vulnerabilities and build effective and persistent defences.

Rippleshot

Rippleshot

Rippleshot is a fraud analytics firm that detects mass card compromises faster, allowing issuers to execute more proactive fraud detection strategies.

Hysolate

Hysolate

Hysolate has transformed the endpoint, making it the secure and productive environment it was meant to be.

Industry IoT Consortium (IIC)

Industry IoT Consortium (IIC)

The Industry IoT Consortium is the world's leading organization transforming business and society by accelerating the Industrial Internet of Things (IIoT).

BoldCloud

BoldCloud

BoldCloud's award winning Cybersecurity Advisory services and Layered Security approach adds new critical layers of protection for your data and your business.

Cyentia Institute

Cyentia Institute

The Cyentia Institute is a research & data science firm with a mission to advance knowledge in the cybersecurity industry.

GB Group (GBG)

GB Group (GBG)

GBG is a global technology specialist in fraud, location and identity data intelligence.

Risk Ledger

Risk Ledger

Risk Ledger is improving the security of the global supply chain ecosystem, reducing the number of data breaches experienced through supply chain attacks by companies and consumers alike.

Motiv ICT Security

Motiv ICT Security

Motiv is the ICT security specialist that provides public and private sector organisations with IT security solutions and services to prevent cybercrime, data theft and data breaches.

Security BSides Cayman Islands

Security BSides Cayman Islands

Security BSides is a non-profit, community-driven event built for and by information security community members. Our aim is to help build an Information Security community in the Cayman Islands.

CertNexus

CertNexus

CertNexus is a vendor-neutral certification body, providing emerging technology certifications and micro-credentials for business, data, developer, IT, and security professionals.

OxCyber

OxCyber

OxCyber's mission is to ignite and encourage cybersecurity and technology growth in the Thames Valley through meetings, webinars, in person events, workshops and mentorship programs.

Secher Security

Secher Security

Secher Security is a professional and secure partner with a high level of professional expertise in simplifying and optimizing complex IT infrastructures.