NEWS > Cybersecurity News


« Back to News

2020-03-10

The Cyber Security Workforce Must Grow 145%

Although cyber security training is increasing there remains an acute skills shortage and the expert cyber workforce urgently needs to get bigger.

2020-02-26

Cyber Security Warnings For US 2020 Election

Security experts warn that government agencies are under attack and that hackers are very likely to focus on the forthcoming US Presidential election.

2020-03-10

90% Of Breaches Are Caused By Human Error

Analysis of data from the UK Information Commissioner’s Office shows that human error caused 90% of data breaches last year.

2020-03-04

Cyber Crime Is Over 50% Of All Reported Crime

Cyber crime is running rampant and Police and other law enforcement often do not to pursue online criminals, or have the resources to do so.

2020-03-02

The New Battlefield

The nature of warfare is changing and the risk is moving from physical disruption to a much more complex and unpredictable cyber environment.

2020-02-24

Sustained Cyber Attacks Are The New Normal

Some businesses are adjusting to the ‘new normal’ of sustained cyberattacks, but there is much more to be done to protect your organisation.

2020-02-19

The Cloud Is Beginning To Attract Criminal Extortion

Mistakes made while setting up cloud permissions and policies create weak spots that attackers can exploit to deliver ransomware.

2020-02-20

The New Wave Of Attack Vectors

Be Prepared: As cyber attacks grow constantly more sophisticated, top industry experts describe the latest wave of attack vectors to look out for.

2020-02-17

British CEOs Worry About Cyber Attacks While Their Businesses Are Under-Insured

Surveys suggest that cyber threats are top of the most pressing risks facing UK businesses leaders, yet less than 20% have a cyber insurance policy.

2020-02-17

Some Expert Predictions For Industrial Cyber Security

Industrial control systems are becoming increasingly connected. They are also becoming increasingly vulnerable. Business must get ready.

2020-02-17

GDPR's Impact In The US And Globally

Outside of the European Union you might think that it doesn’t apply to you, but GDPR affects organisations and businesses worldwide.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DataGuidance

DataGuidance

DataGuidance is a platform used by privacy professionals to monitor regulatory developments, mitigate risk and achieve global compliance.

Vertical Structure

Vertical Structure

Vertical Structure services include Security & Penetration Testing, Information Assurance, Bespoke Training Programs and Secure Hosting.

Concise Technologies

Concise Technologies

Concise Technologies provide specialist IT and telecoms solutions, support services, managed backup, disaster recovery, cyber security and consultancy to SME businesses across the UK and Europe.

Gatewatcher

Gatewatcher

Gatewatcher is a digital breach detection platform targeting crafted attacks and protecting organizations against advanced cyber threats.

Nucleon

Nucleon

Nucleon enables cybersecurity tools, organizations and software developers to become proactive by blocking threats before they become breaches.

Ericom Software

Ericom Software

Ericom is a global leader in securing and connecting the digital workspace, offering solutions that secure browsing, and optimize desktop and application delivery to any device, anywhere.

Sovereign Intelligence

Sovereign Intelligence

Sovereign Intelligence provides automated insight into the relative intensity of hidden Cyber, Brand, and Financial Risks to your company.

Censys

Censys

Our customers rely on Censys data to get the global visibility they need of their attack surfaces in order to proactively prevent nation-state attacks and emerging threats.

Tetra Tech

Tetra Tech

Tetra Tech is a cybersecurity leader with extensive experience in supporting enterprise-wide programs and systems across multiple business lines from industrial control systems to health IT.

Cyber-Security Council Germany

Cyber-Security Council Germany

The German Cyber Security Council's objective is to consult businesses, government agencies and political decision-makers and to support them against cybercrime.

Walacor

Walacor

Walacor’s secure data platform represents the next generation of secure data and blockchain storage with a trust-first approach that revolutionizes enterprise data, and database management systems.

Aura Information Security

Aura Information Security

Aura Information Security consists of a team of highly-skilled and renowned information security professionals spanning Australia and New Zealand.

Skillfield

Skillfield

Skillfield is a Melbourne based Cyber Security and Data Services consultancy and professional services company.

ViCyber

ViCyber

ViCyber is an Australian based company whose mission is to simplify and strengthen cybersecurity for all businesses, irrespective of size.

DRT Cyber

DRT Cyber

DRT Cyber deploys technology solutions to support the functions of cybersecurity, privacy, and risk management.

Hopper Security

Hopper Security

The Future of Open-Source Risk Management Starts Here. We built Hopper to make sure you can harness the power of Open-Source safely and effectively.