NEWS > Cybersecurity News


« Back to News

2018-06-12

Cyber Thesaurus - Vocabulary Pt.1

Cyber-security has its own intimidating jargon. You’ll be better equipped to address your cyber risks when you know the terminology.

2018-06-12

Russia Is Building A Separate Military Cloud

Russia is building a giant military cloud, to improve its ability to keep operating if its connection to the global Internet is hacked or severed.

2018-06-12

Banking Botnet Profit Share

The experts at Flashpoint say two separate banking botnets appear to have started a collaboration targeting systems to steal money.

2018-06-12

Ukraine Detects A Cyber Attack On A NATO Member

The Ukraine Security Service claims to have frustrated an attempted attack on a NATO member state, but remains oddly silent about which one.

2018-06-11

A Looming US vs China Tech War Over Huawei

A full-on tech trade war between the US and China draws closer as the US investigates whether Huawei broke US sanctions against Iran.

2018-06-11

Aircraft Can Be Successfully Hacked In-Flight

A security expert will show BlackHat 2018 how it is possible to hack into in-flight aircraft WiFi networks and Satcom equipment from the ground.

2018-06-11

Ex-GCHQ Boss: Nation State Cyber-Attacks Affect Everyone

All organisations are potential targets of nation state attacks, according to former GCHQ Chief, Robert Hannigan, speaking at Infosecurity18.

2018-06-11

Pentagon Faces Big Challenges In Retaining Cyber Talent

The U.S. Department of Defense faces tremendous challenges in recruiting and retaining trained & experienced cybersecurity professionals.

2018-06-11

Goldman Sachs Offers A Cyber War Games Product

Goldman Sachs is offering its developer community a 'gamified' cybersecurity training programme addressing corporate breaches.

2018-06-08

US Needs To Cultivate Its Cyber Workforce

US efforts to grow its cybersecurity workforce need "immediate and sustained improvements," according to the US Dept. of Homeland Security.

2018-06-08

Backlash: Facebook's Data-Sharing With Chinese Firms

Facebook draws further criticism from US legislators who are angry to learn about data sharing with suspectedly hostile Chinese firms.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Critifence

Critifence

Critifence provides unique Cyber Security solutions designed for Critical Infrastructure, SCADA and Industrial Control Systems.

DOS

DOS

DOS is an Ecuadorian company with 3 decades of presence in the market and extensive experience in the planning, management and execution of IT Service Integration Projects.

North European Cybersecurity Cluster (NECC)

North European Cybersecurity Cluster (NECC)

NECC promotes information security and cybersecurity-related cooperation and collaboration in the Northern European region in order to enhance integration into the European Digital Single Market.

Data Security Inc

Data Security Inc

Data Security, Inc. is the leading American manufacturer and supplier of hard drive degaussers, magnetic tape degaussers as well as hard drive and solid state destruction devices.

GM Security Technologies

GM Security Technologies

GM Security Technologies provides leading managed security services of the highest quality to every type of individual and organization in Puerto Rico, Caribbean and Latin America.

Global Incubator Network Austria (GIN Austria)

Global Incubator Network Austria (GIN Austria)

GIN Austria is the connecting link between Austrian and international startups, investors, incubators and accelerators with a focus on selected hotspots in Asia.

QNu Labs

QNu Labs

QNu Labs’s quantum-safe cryptography products and solutions assure unconditional security of critical data on the internet and cloud across all industry verticals, globally.

IQ4 - Cybersecurity Workforce Alliance (CWA)

IQ4 - Cybersecurity Workforce Alliance (CWA)

Cybersecurity Workforce Alliance, a division of iQ4, is an organization comprised of a diverse range of professionals dedicated to the development of the cybersecurity workforce.

Infopercept Consulting

Infopercept Consulting

Infopercept is a leading cybersecurity company in India, providing a critical layer of security to protect business information, infrastructure & assets across the organization.

Arcanna.ai

Arcanna.ai

Using a wide range of out-of-the box integrations, Arcanna.ai continuously learns from existing enterprise cybersecurity experts and scales your team’s capacity to deal with threats.

Edgio

Edgio

Edgio provides unmatched speed, security, and simplicity at the edge through globally-scaled media and applications platforms.

Curatrix Technologies

Curatrix Technologies

Curatrix Technologies is a Managed IT Service provider based in Hampshire, UK, providing high quality and reliable Managed IT Services since 2015.

Cysurance

Cysurance

Cysurance is a next-generation risk mitigation company that insures, warranties and certifies security solutions.

Turngate

Turngate

Turngate simplify security investigations so you can see employee activities and entitlements in your enterprise in seconds.

Tracebit

Tracebit

Tracebit uses decoys to detect and respond to cloud intrusions in minutes.

IS4IT Kritis

IS4IT Kritis

IS4IT is your partner for the successful planning, introduction and implementation of company-specific information security concepts.