NEWS > Cybersecurity News


« Back to News

2019-08-14

Training Robots & Human Bias

Robotic development is creating computer systems which can substitute and replicate both human actions and human fallibility.

2019-08-14

N. Korea’s Hackers Stole $2b To Fund Its Missile Program

Money stolen from foreign financial institutions by cyber-attacks is now being spent on North Korea's frightening nuclear weapons build-up.

2019-08-13

Cyber Security Jobs & The Skills Gap

IT and Cyber professionals with the requisite knowledge and skills are highly sought after. How can you navigate a new career in cyber security?

2019-08-09

IBM X Force Dissect The Destructive Power Of Malware

Organisations previously thought safe from this form of cyber aggression increasingly find themselves affected, either directly or indirectly.

2019-08-07

British Army Reshapes Itself To Fight Cyberwars

Computer hackers and propaganda specialists are to form 6th Division, reflecting a doctrine that the boundaries between peace and war are fading.

2019-08-06

More About The Capital One Breach

Details are emerging about the massive breach affecting over 100 million credit card customers of CapitalOne, which first went unnoticed.

2019-08-06

Cyber Terrorism & Piracy

Terrorism today is a widening series of global alliances, supported and connected via social media and fake news. By Alfred Rolington

2019-08-06

Malware Attacks Drop As Encrypted Attacks Increase

Malware is down, but it's getting more malicious in terms of the type of malware and how it is delivered. Ransomware is now a SAAS offering.

2019-08-05

We Can Reduce Cybercrime, But Why Are We Failing?

Devin Smith puts cybercrime under a magnifying glass, intending to combat or at least limit the malicious practices of criminal malpractitioners.

2019-08-01

Four Questions To Ask After An Attack

Swift and comprehensive incident response is a critical step to ensuring the future security of a business and protecting its reputation.

2019-07-30

What Is The Dark Web?

A collection of websites that exist on an encrypted network and cannot be found by using traditional search engines or by using traditional browsers.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Serena

Serena

Serena Software helps increase speed of the software development lifecycle while enhancing security, compliance, and performance.

MKD-CIRT

MKD-CIRT

MKD-CIRT is the national Computer Incident Response Team for Macedonia.

ODVA

ODVA

ODVA is a global trade and standards development organization whose members comprise the world’s leading industrial automation companies.

Komodo Consulting (KomodoSec)

Komodo Consulting (KomodoSec)

Komodo Consulting specializes in Penetration Testing and Red-Team Excercises, Cyber Threat Intelligence, Incident Response and Application Security.

NETAS

NETAS

Netas offers solutions in information and communication technologies including end-to-end value added solutions, system integration and technology services to providers and corporations.

Level Effect

Level Effect

Level Effect is developing new capabilities to bring a unique perspective on proactive network defense and advanced security analytics.

eXate

eXate

eXate provides pioneering technology that empowers organisations to protect, control and manage their sensitive data centrally, providing a complete data privacy solution.

Trava Security

Trava Security

Trava simplifies cyber risk management for business owners and IT professionals. Automated assessments, mitigation advising, and data-driven cyber insurance.

Revere Technologies

Revere Technologies

Revere Technologies is a pure-play cyber security solutions and services provider in Sub-Saharan Africa.

Prelude Research

Prelude Research

Prelude offer the first autonomous platform built to attack, defend and train critical assets through continuous red-teaming.

Red Access

Red Access

Red Access provides the first SaaS-based platform to protect web browsing from cyber threats on any browser and any in-app while ensuring frictionless user experience.

ADNET Technologies

ADNET Technologies

ADNET Technologies is a SOC 2, Type II Compliant IT management and cybersecurity firm.

Verinext

Verinext

Verinext delivers transformative business technology, from intelligently automating time-consuming tasks and protecting data assets to securing infrastructure and improving customer experiences.

Paramount Defenses

Paramount Defenses

Paramount Defenses have unrivaled capability in two of the most critical areas in cyber security today – Active Directory Security and Privileged Access.

HanaByte

HanaByte

HanaByte is a security consultancy focused on delivering state of the art solutions in the cloud. We specialize in delivering cloud services with an emphasis on security.

OmniSecuritas Technologies

OmniSecuritas Technologies

Omnisecuritas assists businesses in maintaining secure and resilient operations by providing comprehensive, affordable, turnkey cybersecurity products and services to businesses of all sizes.