NEWS > Cybersecurity News


« Back to News

2018-03-28

Snowden Says Bitcoin Is Not Private

The NSA whisltleblower turned tech pundit points out that the blockchain public ledger means that anyone can see Bitcoin transactions.

2018-03-28

Google Launches An Initiative To Tackle Fake News

Google will spend $300m to support the media industry through greater filtration of content, fight misinformation & to support accurate journalism.

2018-04-03

The Symphonic Enterprise

How Strategy, Technology, and Operations Work Together: Leading companies can learn to leverage technology broadly across the enterprise.

2018-04-03

Data Protection Officer's Guide To The GDPR Galaxy

Is the imminent GDPR deadline got you freaking out? These five tips might help you calm down, at least a little bit.

2018-04-03

Self-driving Uber Vehicle Strikes & Kills

Uber has halted testing of its autonomous vehicles in the USA after a woman was struck and killed by one of its self-driving cars in Arizona.

2018-04-03

Have You Gauged The Cost Of A Cloud Outage?

Many organisations have not fully evaluated the cost of a cloud outage to their business and are ill prepared to deal with the impact of an outage.

2018-03-29

Cybersecurity Incidents Are Major Business Disruptions

Insurance giant Allianz finds that cyber incidents and major business interruptions are interlinked and cybersecurity is an urgent priority.

2018-03-28

US City Of Atlanta Suffers An Attack

Atlanta has come under attack in the first known incident of ransomware being used against multiple municipal operations.

2018-03-28

Facebook’s Influence On UK Politics

The idea of marketing to voters on Facebook was brought to the UK by the Obama campaign. It has now become a significant factor in British elections.

2018-03-30

The Cambridge Analytica Row Shows Politics Are Moving In A Disturbing Direction

Nearly all the digital methods used by Cambridge Analytica are both perfectly legal and widespread. So what's the problem? By Jamie Bartlett.

2018-03-27

Cognitive Computing And AI Compared

Artificial Intelligence and Cognitive Computing are really not the same thing. One simulates human intelligence, the other improves it.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Radware

Radware

Radware is a global leader of application delivery and cyber security solutions for virtual, cloud and software defined data centers.

Avatu

Avatu

Avatu specialise in providing clients the advice, technology and tools they need to fight cyber and insider threats.

Igloo Security

Igloo Security

Igloo Security is a leader and pioneer in SIEM (Security Information & Event Management), PSIM (Physical Security Information Management) and MSS (Managed Security Services).

TeachPrivacy

TeachPrivacy

TeachPrivacy provides computer-based privacy and data security training that is engaging, memorable, and understandable.

NT Cyfence

NT Cyfence

CAT Cyfence is the IT Security services business unit of CAT Telecoms.

CounterCraft

CounterCraft

The CounterCraft Cyber Deception Platform fits seamlessly into existing security strategies and delivers high-end deception for threat hunting and threat detection.

Safetica

Safetica

Safetica Technologies is a Czech software company that delivers data protection solutions for businesses of all types and sizes.

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field.

Towerwall

Towerwall

Towerwall offers a comprehensive suite of security services and solutions using best-of-breed tools and information security services.

Falcongaze

Falcongaze

Falcongaze SecureTower is a comprehensive DLP solution for the protection of business against internal threats.

Shearwater Group

Shearwater Group

Shearwater Group is an award-winning organisational resilience group that provides cyber security, advisory and managed security services to help secure businesses in a connected global economy.

Cyber Range Solutions (CRS)

Cyber Range Solutions (CRS)

CRS provides cyber security training and improve security team performance by providing a hyper realistic, virtual training environment.

ControlMap

ControlMap

ControlMap is a software as a service platform with a mission to simplify and eliminate stress from everyday operations of modern IT compliance teams.

WeVerify

WeVerify

WeVerify is a platform for collaborative, decentralised content verification, tracking, and debunking.

Oak9

Oak9

Oak9's Security as Code platform dynamically secures Infrastructure as Code (IaC) and deployed cloud workloads, automatically.

SITS Group

SITS Group

SITS Group excel in delivering a comprehensive range of Cyber Security consulting and managed services, from cloud transformation to risk management.