NEWS > Cybersecurity News


« Back to News

2018-07-09

Crypto-Mining For Cyber Criminals

Malicious crypto-mining malware is becoming a top tactic among cyber criminals according to WatchGuard Security's Q1 threat intelligence update.

2018-07-07

Cybercrime & Terrorism Threaten South Africa

S Africa needs more advanced gadgets to detect early danger signals and its intelligence service needs more well-trained agents in the field.

2018-07-06

Theft & Subsequent Re-Use of Cyber Weapons

A year has passed since two widespread and very destructive attacks, both using offensive cyber tools created by the NSA and then stolen.

2018-07-05

Using AI To Reduce Business Risks

The constant evolution of malware, ransomware and other threats makes detection with conventional cybersecurity protocols increasingly difficult.

2018-07-05

Can Russian Hackers Be Stopped?

Few companies can survive a sustained assault by hackers, even fewer are prepared to defend against state-backed attacks. Is there a deterrent?

2018-07-05

MSAB Joins CASE Initiative On Digital Forensics

MSAB has joined other industry leaders to work collaboratively on the Cyber-Investigation Analysis Standard Expression (CASE) initiative.

2018-07-04

The Five Most In-Demand Cybersecurity Roles

More companies are seeking cybersecurity professionals in efforts to comply with the EU's General Data Protection Regulation (GDPR).

2018-06-29

CyberPatriot Trains Kids To Protect America

CyberPatriot pits teams of middle and high school students against each other as they try to secure their computers against hackers and malware.

2018-07-04

US Builds The Fastest Supercomputer. For Now.

The arms race in computing power to drive AI and other complex data processes continues apace as 'Summit' leapfrogs 'Sunways TaihuLight'.

2018-07-04

How Cloud Computing Changes Data Governance Strategies

Whether on-premises, private, hybrid or multi-cloud, organisations getting the benefit of the cloud require an alternative data governance approach.

2018-07-04

What Does Blockchain Mean To The EU?

There are growing indications that the European Union is waking up to the vast potential offered by the technology.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Becrypt

Becrypt

Becrypt is a trusted provider of endpoint cybersecurity software solutions. We help the most security conscious organisations to protect their customer, employee and intellectual property data.

CGI Group

CGI Group

CGI is a leading IT and business process services provider. Services include IT consulting, Systems Integration, Application Development, Infrastructure, Business Processes, Digital IP.

CERT Polska

CERT Polska

CERT Polska is the first Polish computer emergency response team and operates within the structures of NASK (Research and Academic Computer Network) research institute.

EC-Council

EC-Council

EC-Council is a member-based organization that certifies individuals in various e-business and information security skills.

Momentum

Momentum

The Cyber Security team at Momentum offers a professional and specialist recruitment service across Cyber & IT Security.

National Cyber League (NCL)

National Cyber League (NCL)

The NCL provides a virtual training ground for participants to develop, practice, and validate their cybersecurity knowledge and skills.

MIT Internet Policy Research Initiative (IPRI)

MIT Internet Policy Research Initiative (IPRI)

IPRI's mission is to work with policy makers and technologists to increase the trustworthiness and effectiveness of interconnected digital systems

PrimeKey

PrimeKey

PrimeKey provides organisations with the ability to implement security solutions such as e-ID, e-Passports, authentication, digital signatures, unified digital identities and validation.

Wipe-Global

Wipe-Global

Wipe-Global is specialized in data erasure with an international established service partner network.

Selectron Systems

Selectron Systems

Selectron offers system solutions for automation in rail vehicles and support in dealing with your railway cyber security challenges.

Intechtel

Intechtel

Intechtel is a cyber security company, in addition to providing other internet, technology and telephone services.

Motorola Solutions

Motorola Solutions

Motorola Solutions build mission-critical services, software, video and analytics, backed by secure, resilient land mobile radio communications.

US Army Cyber Command (ARCYBER)

US Army Cyber Command (ARCYBER)

US Army’s Cyber Command (ARCYBER) is engaged in the real-world cyberspace fight today, against near-peer adversaries, ISIS, and other global cyber threats.

RedHunt Labs

RedHunt Labs

RedHunt Labs is a premier Cybersecurity Solutions provider, offering Attack Surface Management solution 'NVADR' and Penetration Testing services.

Darkscope

Darkscope

Darkscope is an award-winning personalised cyber intelligence service provider. Our cutting-edge AI and Deep Artificial Neural Networks lead the world of cyber intelligence solutions.

SOOS

SOOS

SOOS is the easy-to-integrate software security solution for your whole team. Build, catch, and fix vulnerabilities with SOOS Software Composition Analysis.