NEWS > News Analysis


« Back to News

2022-06-14

Estonia Fears Cyber Attacks Will Rise Because Of War In Ukraine

Estonia's cyber security is a critical investment and the nation is finding ways to improve resilience & build sophisticated offensive capabilities.

2022-06-06

Energy Companies Unready For Lethal Cyber Attacks

Industry professionals say that complacency and a lack of adequate training in the Energy sector is placing critical infrastructure at high risk.

2022-05-25

A Phishing Attack That Delivers Three Forms Of Malware

Trojan Malware: Inserting malicious links into phishing emails allows attackers to harvest usernames, passwords & bank details from Windows users.

2022-05-23

European Union Agrees New Cyber Security Legislation

NIS 2: The EU has reached agreement on new legislation to impose common cyber security standards on critical EU industry sectors.

2022-05-23

Personal Data Of Two Million Texans Left Exposed For Years

Social Security numbers, addresses, dates of birth, phone numbers and other personal information exposed to anyone who knew how to find it.

2022-05-13

Some Apps Come Loaded With Malware

App stores share a common threat profile. Apps loaded with malware present the most immediate risk to millions of unsuspecting users.

2022-05-10

The Cyber Security Investment Boom Continues

M&A activity grew to over $70 billion in 2021and reached almost $27 billion by the end Q1 2022, but there are signs investors are getting cautious.

2022-04-28

Cyber Criminals Increasingly Focus On Mobile Devices

Mobile platforms supply an ever increasing number of distributed endpoints and their security is no longer an option for businesses. By Ian Porteous.

2022-04-27

Twitter, Free Speech & Disinformation

Elon Musk’s purchase of Twitter might mean the site will do even less to moderate extremism, hate speech, fake news and disinformation.

2022-04-26

Iran Has Stopped A Large Scale Infrastructure Attack

Unamed cyber attackers were planning to exploit a security gap in the software most widely used by infrastructure organisations in Iran.

2022-04-20

Pegasus Spyware Used To Target British Prime Minister

Evidence found of surveillance software being present on devices associated with the British Prime Minister’s Office at 10 Downing Street.

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Perimeter 81 / Zero Trust Network Access Guide

Perimeter 81 / Zero Trust Network Access Guide

Curious how you can Implement a Zero Trust roadmap with insights from Gartner? Download this free report for a limited time only.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Native Tele-Data Solutions (NTDS)

Native Tele-Data Solutions (NTDS)

NTDS is a leader in IT technology design and installation, specializing in standardized structured cable systems for voice, data, security and video.

ForeScout Technologies

ForeScout Technologies

ForeScout delivers pervasive network security by allowing organisations to continuously monitor & mitigate security exposures & cyberattacks.

Information Commissioner's Office (ICO)

Information Commissioner's Office (ICO)

The Information Commissioner's Office is an independent authority set up to uphold information rights in the public interest.

SOTI

SOTI

SOTI is an industry leader in Enterprise Mobility Management (EMM).

InteliSecure

InteliSecure

InteliSecure offer Professional Services, Security Assessments and Managed Services for data and threat protection.

Sintef Digital

Sintef Digital

Sintef Digital carries out research in Information and Communication Technology for industry and the public sector.

AGAT Software

AGAT Software

AGAT Software is an innovative security provider specializing in external access authentication and data protection solutions.

Jazz Networks

Jazz Networks

Jazz Networks provides user behavior analytics (UBA UEBA) and data loss prevention (DLP) cybersecurity software to prevent the insider threat.

Hdiv Security

Hdiv Security

Hdiv Security is the first product in its class offering protection against Security Bugs and Business Logic Flaws throughout the Software Development Lifecycle (SDLC).

Conference Index

Conference Index

Conference Index provides an indexed listing of upcoming meetings, seminars, congresses, workshops, summits and symposiums across a wide range of subjects including Cybersecurity.

IdentityIQ

IdentityIQ

IdentityIQ is a US-based identity theft and credit protection company designed to help users stay on top identity thieves and data breaches.

Entisys360

Entisys360

Entisys360 is an award-winning IT consultancy specializing in advanced IT infrastructure, virtualization, security, automation and cloud first solutions.

WidePoint

WidePoint

WidePoint Corporation is an innovative provider of Trusted Mobility Management (TM2) solutions.

Pentest Limited

Pentest Limited

Pentest Limited provide information security consultation, penetration testing & red teaming services to companies across the globe.

RocketCyber

RocketCyber

RocketCyber is a Managed SOC platform empowering Managed Service Providers (MSPs) to deliver security services to small and medium businesses.

nsKnox

nsKnox

nsKnox is a fintech-security company, enabling corporations and banks to prevent fraud and ensure compliance in B2B Payments.