NEWS > Cybersecurity News


« Back to News

2018-04-10

Iranian Hackers Adopt New Methods

An Iranian espionage group has been using new malware and data exfiltration techniques in recent attacks, say the experts at Nyotron.

2018-04-09

Home Working Is A Threat To Cybersecurity

Forget About BYOD: Chartity sector workers should avoid taking work devices and sensitive work information home with them.

2018-04-09

Fake News Will Lead To A Cyber War

When people start to believe everything they read, it makes the world a very unpredictable place. In the real world, fake news is a form of cyber attack.

2018-04-09

IBM’s Watson Takes On The IoT

IBM Watson Assistant is a new artificial intelligence assistant designed to work with autonomous and IoT devices.

2018-04-06

Using GDPR Compliance To Excel At CRM

GDPR offers an unprecedented opportunity for businesses to provide better data security and privacy services to their customers.

2018-04-06

The Cambridge Analytica Case Is A Red Herring

There's nothing Cambridge Analytica could have done that Facebook itself doesn't routinely offer political clients.

2018-04-05

Inside the Big Business Of Cyber Crime

Just as big businesses operate based on regulations, the laws of supply and demand and even customer reviews, so does the black market.

2018-04-04

Snowden Says Social Media Is Surveillance 'Rebranded'

Edward Snowden thinks that social media platforms have deceived their users and are, in fact, the same as surveillance companies.

2018-03-29

DARPA Wants AI To Reveal Adversaries' True Intentions

The US Defense Advanced Research Projects Agency will use AI to understand and detect how adversaries are using deception & covert tactics.

2018-04-04

Healthcare Security Should Use More Sophisticated Tools

IT staff for healthcare providers must regularly update their cybersecurity practices to keep them ahead of emerging security challenges.

2018-04-04

Staying One Step Ahead Of The Cyber Spies

Growth Market: GCHQ estimate that 34 separate nations have serious, well-funded cyber espionage teams targeting friends and foes alike.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Bulletproof Cyber

Bulletproof Cyber

Bulletproof offer a range of security services, from penetration testing and vulnerability assessments to 24/7 security monitoring, and consultancy.

iLand

iLand

iland is a global cloud service provider of secure and compliant hosting for infrastructure (IaaS), disaster recovery (DRaaS), and backup as a service (BaaS).

TrustArc

TrustArc

TrustArc provide privacy compliance and risk management with integrated technology, consulting and TRUSTe certification solutions – addressing all phases of privacy program management.

StackRox

StackRox

StackRox delivers a container-native security platform that adapts detection and response to new threats.

ES2

ES2

ES2 is a consulting organisation specialising in Enterprise Security and Solutions Services.

Data Security Inc

Data Security Inc

Data Security, Inc. is the leading American manufacturer and supplier of hard drive degaussers, magnetic tape degaussers as well as hard drive and solid state destruction devices.

LinkShadow

LinkShadow

LinkShadow is a next-generation cybersecurity solution that provides unparalleled detection of even the most sophisticated threats.

Speedinvest

Speedinvest

Speedinvest is one of Europe’s most active early-stage investors with a focus on Deep Tech, Fintech, Industrial Tech, Network Effects, and Digital Health.

Aryaka

Aryaka

Aryaka’s SmartServices offer connectivity, application acceleration, security, cloud networking and insights leveraging global orchestration and provisioning.

Data#3 Limited (DTL)

Data#3 Limited (DTL)

Data#3 Limited (DTL) is a leading Australian IT services and solutions provider.

Cyber1

Cyber1

CYBER1 is a leader in cyber security advisory and solutions. We are uniquely placed to help customers achieve cyber resilience and thus, safeguard reputation and value.

IDVerse

IDVerse

IDVerse is focused on making user verification effortless through technology. We build intelligent tools that protect users from identity fraud while enabling a seamless user experience.

Astreya

Astreya

Astreya is the leading IT solutions provider for some of the world's most recognizable and innovative organizations.

Maveris

Maveris

Maveris is an IT and cybersecurity company committed to helping organizations create secure digital solutions to accelerate their mission.

Anagram

Anagram

Anagram is the world’s first human-driven security awareness training platform that delivers real results.

FatPipe Networks

FatPipe Networks

FatPipe’s network optimization solutions along with robust native security and SASE-based protection provides organizations all they need for super network performance and security.