NEWS > Cybersecurity News


« Back to News

2018-01-26

Employees Are Key To Cybersecurity

Insiders are the largest source of corporate data breaches, inadvertent or malicious, yet 55% do not get any training.

2018-01-25

Pentagon Considers Nuclear Retaliation To Big Cyber Attacks

An extreme response to an extreme problem: Why use hack-back tactics when you can drop a nuke on your cyber attackers?

2018-01-25

World Economic Leaders Fear Increasing Cyber Attacks

World leaders at WEF in Davos are contemplating a “deteriorating geopolitical landscape” where cybersecurity has jumped right up the agenda.

2018-01-24

Companies Are Buying Cyber Insurance 'in mad panic'

Many firms feel under siege from cyber attackers. But can insurers quantify the risk accurately and could insurance lead to corporate complacency?

2018-01-24

What Is Fog Computing?

An architecture that distributes resources of computing, storage, control and networking along the continuum from Cloud to Things.

2018-01-24

Stuxnet: The Father Of Cyberkinetic Weapons

Its the 10th anniversary of the Stuxnet attack on the Iranian nuclear weapons program. The world’s first cyber weapon opened Pandora’s box.

2018-01-23

Army Chief Urges UK To Increase Cyber Defence & Attack Capabilities

The UK’s ability to respond to threats will be eroded if the country does not keep up with its adversaries in terms of defence spending.

2018-01-23

Facebook Users To Rank The News They Trust

Facebook plans to diminish its role as an arbiter of the news people see and will rank news organisations by credibility based on user feedback.

2018-01-23

Insiders Are Behind Most Business Cybersecurity Incidents

Insider threats are a much bigger risk to cyber security than external hackers, with 74% of cyber incidents happening from within companies.

2018-01-22

The CIA Discovers It Has A Mole

The arrest of a former CIA case officer sheds light on a shadowy counterintelligence drama that has been playing out for nearly eight years.

2018-01-22

How To Handle A Cyber Crisis

An unnamed Canadian Bank didn’t know how to publicly manage a cyber crisis and called in the experts. Here is their advice.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

WIRED

WIRED

WIRED is the magazine about what's next – the people, the trends and the big ideas that will change our lives. Topics covered include cyber security.

Telos

Telos

Telos offers cybersecurity solutions and services that empower and protect the world’s most security-conscious enterprises.

HackLabs

HackLabs

HackLabs is a penetration testing company providing services for network security, web application security and social engineering testing.

New Zealand Internet Task Force (NZITF)

New Zealand Internet Task Force (NZITF)

The New Zealand Internet Task Force (NZITF) is a non-profit with the mission of improving the cyber security posture of New Zealand.

CyberProof

CyberProof

CyberProof aims to give clarity and confidence to businesses worldwide using a new risk-based approach to cyber security services.

spiderSilk

spiderSilk

spiderSilk is a Dubai-based cybersecurity firm, specializing in simulating the most advanced cyber offenses on your technology so you can build your best security defenses.

Internetwork Defense (IND)

Internetwork Defense (IND)

Internetwork Defense is a premier provider of Information Security Training and Business Consulting Services in the Mid-Atlantic region.

L3Harris Technologies

L3Harris Technologies

L3Harris Technologies is a global aerospace and defense technology innovator, delivering solutions to meet mission-critical needs across air, land, sea, space and cyber domains.

Symptai Consulting

Symptai Consulting

Symptai Consulting is a leading Cyber Security, Digital Transformation and Anti-Money Laundering firm serving the Caribbean and the wider world.

Votiro

Votiro

Votiro is an award-winning cybersecurity company that specializes in file sanitization, ensuring every organization is safe from zero-day and undisclosed attacks.

Persistent Systems

Persistent Systems

Persistent Systems are a trusted Digital Engineering and Enterprise Modernization partner, combining deep technical expertise and industry experience to help our clients.

EdgeWatch

EdgeWatch

EdgeWatch is a platform that helps information accredited security practitioners discover, monitor, and analyze devices that are accessible from the Internet.

Core4ce

Core4ce

Core4ce is a mission-oriented company that serves as a trusted partner to the national security community.

Whitaker Brothers

Whitaker Brothers

Whitaker Brothers data destruction equipment can be found in 115 countries and every single continent in the world, from major military organizations to small offices.

PureSoftware

PureSoftware

PureSoftware is a global software products and digital services company that is driving transformation for the world’s top organizations across various industry verticals.

Yokai

Yokai

Yokai is a secure, distributed platform for data communication with enhanced security features tailored for classified environments such as finance, defence, healthcare, cybersecurity, and more.