NEWS > Cybersecurity News


« Back to News

2018-08-23

Cyber Audits Can Save Businesses $1.5m

IBM say that systematic monitoring, logging, and auditing procedures can cut the average cost of each security breach by more than $1 million.

2018-08-24

The Market For Cybercrime Tools Is Thriving

A Dark Web survey shows cyber criminals no longer need deep technical knowledge - any type of attack is now feasible given sufficient funding.

2018-08-03

Germany Wants A Legal Framework For Cyberwar

In response to domestic intelligence reports of surging nation-state attacks against it, Germany wants to actively respond to acts of cyberwar.

2018-08-23

An Election Interference Alert System

An early warning system being developed to spot attempts to subvert elections by searching out fake news & propaganda would be easily thwarted.

2018-08-22

Blockchain In Plain English

What is Blockchain really all about? In an attempt to make this definition as simple as possible, Blockchain automates trust.

2018-08-22

Cybersecurity Jumps Up The Corporate Agenda

Security experts are more worried about data breaches than ever, with most fearing Meltdown-Spectre type attacks will become the new normal.

2018-08-21

Phishing Tools Used To Attack The Power Grid

Russian hackers penetrated hundreds of US utilities, manufacturing plants gained access by using the most conventional of phishing tools.

2018-08-21

The Impact Of Economic Espionage

An official US Government report highlights current threats and future trends in foreign intelligence efforts to steal trade secrets.

2018-08-20

Hackers Can Buy Tools To Attack Your Business For $40

An analysis of 25 DarkWeb sites examined the costs to buy cybercrime tools & services to carry out both simple and more complex attacks.

2018-08-20

Malware – The Hateful Eight

Thesaurus Part 2: This concise malware bestiary will help you get your malware terms right when you hang out with the experts.

2018-08-17

Blackmail Emails Demand Bitcoin Payment

The sender threatens that if you do not pay $1000 in Bitcoin within one day then compromising video will be sent to all of your contacts.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

King & Spalding

King & Spalding

King & Spalding is an international law firm with offices in the United States, Europe and the Middle East. Practice areas include Data, Privacy & Security.

Promon

Promon

Promon is an application security vendor providing Self-Protection abilities to Mobile apps and Desktop applications.

MailGuard

MailGuard

MailGuard delivers a full suite of security solutions across email and web to protect your business before threats reach your environment.

Data Recovery Services (DRS)

Data Recovery Services (DRS)

DRS provides data recovery services from media including hard disk drives, RAID, solid state disks SSD, memory sticks, USB drives, SD cards, tapes and mobile phones.

DefCamp

DefCamp

DefCamp is the most important annual conference on Hacking & Information Security in Central Eastern Europe.

Resec Technologies

Resec Technologies

Resec provides total protection against all types of known and unknown malware threats including viruses, Trojans, ransomware and phishing, regardless of their delivery method.

AKATI Sekurity

AKATI Sekurity

AKATI Sekurity is a security-focused consulting firm providing services specializing in Information Security and Information Forensics.

Cyber Physical Security Research Center (CPSEC)

Cyber Physical Security Research Center (CPSEC)

CPSEC aims to contribute to the security enhancement of industrial infrastructure that creates value across cyber space and physical space.

Technology Ireland ICT Skillnet

Technology Ireland ICT Skillnet

Technology Ireland ICT Skillnet is a network of companies who collaborate to address skills needs within the technology sector.

ShorePoint

ShorePoint

ShorePoint is an elite cybersecurity firm dedicated to improving the cyber resilience of Federal agencies and their missions.

Key Cyber Solutions

Key Cyber Solutions

Key Cyber is an IT consulting firm that specializes in agile software development services, program management and infrastructure services, cyber security and cloud and managed services.

Northcross Group (NCG)

Northcross Group (NCG)

NCG provides services to help organizations meet the challenges of regulatory compliance. Our services include support, consultation, tools and accelerators for all parts of an organization.

Illuma Labs

Illuma Labs

Illuma Labs delivers real-time voice authentication and fraud prevention solutions.

Technology Innovation & Startup Centre (TISC)

Technology Innovation & Startup Centre (TISC)

TISC is a startup incubator at the Indian Institute of Technology Jodhpur (IITJ) and we back deep-tech startups.

Opticks Security

Opticks Security

Opticks provides fraud detection and monitoring solutions for leading brands. agencies and networks. Our relentless mission is to deliver reliable and innovative software to beat digital fraud.

Plerion

Plerion

Plerion is an all-in-one Cloud Security Platform that supports workloads across AWS, Azure, and GCP delivering cloud security posture management, workload security, data security and more.