NEWS > Cybersecurity News


« Back to News

2018-12-03

Five Trends In Attacks On Industrial Control Systems

Attacks on industrial control systems are up, according to Kaspersky and Symantec. The attack data reveals five specific trends.

2018-11-29

Facebook's Sheryl Sandberg Is 'Tainted' By Crises

As the problems swirling around Facebook gain force, some insiders think that COO Sheryl Sandberg may end being handed the blame.

2018-11-29

Google Challenged Over Location Tracking

Seven consumer groups have filed complaints against Google with national regulators, alleging that user location tracking is in violation of GDPR.

2018-11-29

Uber Fined By Regulators In Britain & The Netherlands

Avoidable data security flaws allowed the personal details of around 2.7 million UK customers to be accessed and downloaded by attackers.

2018-11-30

Barclays Fights Off Cyber-Attacks Daily

Barclays Bank fights off attacks from cyber criminals every single day, according to the head of the bank’s cyber security operations centre.

2018-11-28

British Parliament Seizes Facebook Documents

Rarely used parliamentary powers have been used to demand that a US software firm hand over secret data and Facebook say they want it back.

2018-11-29

Cyber Attacks On Australia Reveal A Pattern

Skip R&D, go straight for the IP: China is breaking an agreement with Australia not to steal each other's commercial secrets.

2018-11-29

From Machine Learning To Machine Reasoning

AI doesn’t fit the technology adoption lifecycle pattern. Rather it’s a quest… a quest for the intelligent machine.

2018-11-27

Russian Hackers Have New Weapons

Call them by their names: Fancy Bear, Cozy Bear, APT28 and Sofacy. They are all launching fresh attacks and one is on a mini-espionage campaign.

2018-11-27

Russian Cyber Strategy And Tactics

Russia views cyber very differently to its western counterparts, from how they define cyberwarfare to how they employ cyber capabilities.

2018-11-27

Google Helps Boost High Street Spending

Google has teamed up with start-up NearSt to help consumers see what is available in their local shops via the web.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Infineon Technologies

Infineon Technologies

Infineon is a leader in semiconductor solutions for a huge range of applications including automation, smart systems and security for the Internet of Things.

Cyber, Space, & Intelligence Association (CSIA)

Cyber, Space, & Intelligence Association (CSIA)

CSIA focuses on issues critical to Cyber Security, Military Space and Intelligence.

ObjectSecurity

ObjectSecurity

ObjectSecurity is a leader in authorization policy automation. With OpenPMF, you can manage application security policies for access control and auditing.

Bavarian IT Security Cluster

Bavarian IT Security Cluster

The Bavarian IT Security Cluster works to build regional IT security competencies and increase the competitiveness and market opportunities of its member companies.

CI-CERT

CI-CERT

CI-CERT is the national Computer Incident Response Team for Cote d'Ivoire.

Vivitec

Vivitec

Vivitec security services are tailored for your business, industry, risk, technology, and size to ensure great protection and planned response for the inevitable cyber-attacks on your business.

Secure Technology Integration Group (STIGroup)

Secure Technology Integration Group (STIGroup)

Secure Technology Integration Group, Ltd. (STIGroup) is an innovative firm that provides CyberSecurity consulting, secure IT engineering, managed security services, and human capital solutions.

Madrona Venture Group

Madrona Venture Group

Madrona Venture Group invests in seed and early-stage technology companies in areas including cybersecurity.

M2MD Technologies

M2MD Technologies

M2MD Technologies offers solutions optimized for cellular IoT that provide stronger security, reduced costs, enhanced user experience, and ultimately generates higher returns for stakeholders.

Client Solution Architects (CSA)

Client Solution Architects (CSA)

Client Solution Architects (CSA) is a leading digital transformation consulting firm focused on the U.S. Defense Department and all U.S. Federal enterprise information technology service areas.

HLB Mann Judd (Fiji)

HLB Mann Judd (Fiji)

HLB Mann Judd (Fiji) (formerly known as HLB Crosbie & Associates) is a well-established firm of accountants and business advisers in Fiji.

TheHive Project

TheHive Project

TheHive Project is a Scalable, Open Source and Free Security Incident Response Platform for SOC, CSIRT and CERT teams.

IONOS

IONOS

IONOS is a leading provider of cloud infrastructure, cloud services, and hosting with more than 8.5 million customers contracts.

NexusTek

NexusTek

NexusTek is a managed IT services provider with a comprehensive portfolio comprised of end-user services, cloud, infrastructure, cyber security, and IT consulting.

FoxPointe Solutions

FoxPointe Solutions

FoxPointe Solutions is a full-service cyber risk management and compliance firm.

FearsOff

FearsOff

FearsOff is a global information security company serving clients worldwide. White hat operators with a black hat mindset to emulate real world attacks and everchanging threat vectors.