NEWS > Cybersecurity News


« Back to News

2017-11-30

The US National Security Agency Is On The Ropes

Serial leaks of the agency's cyber-weapons have damaged morale, slowed intelligence operations & resulted in attacks on businesses worldwide.

2017-11-27

Who's Responsible For Cloud Security?

While the cloud brings benefits, security remains a particular area of concern for US government agencies and it’s not always clear who’s in charge.

2017-11-25

Cyber Monday 2017 UK Deals

$3.5 Billion Spent In One Day: Forget about Black Friday, if you want to buy tech equipment online, it's all about Cyber Monday 27th November.

2017-11-24

Saudi Arabia Under Attack

Muddy Water: Saudi Arabian security officials admit that the country has been targeted as part of a wide-ranging cyber espionage campaign.

2017-11-24

Uber Wants 24,000 Driverless Volvos

Volvo says it will supply Uber’s Advanced Technologies Group with 24,000 XC90 SUVs equipped with autonomous self-driving technology.

2017-11-23

Is Your Data Being Sold On The Dark Web?

Experts say the number of forums of interest to business cybersecurity professionals is actually quite small as a proportion of the total Dark Web.

2017-11-23

In Demand: Cybersecurity Specialists

Cybersecurity is a high paying career yet many job positions are still unfilled and companies are desperate to hire qualified professionals.

2017-11-23

First EU Cyber Defence Exercise

In a simulation, EU Defence Ministers faced sabotage to a naval mission and a social media campaign to discredit them. How did that go?

2017-11-23

The New GDPR Rules Focus On Consumer Protection

Companies that comply and choose to be transparent with customers will benefit from longer and more valuable consumer relationships.

2017-11-22

MI5 In The Clear Over Terror Attacks

An independent review clears MI5 & police of making mistakes that allowed terrorists to strike Britain and recommends a 'terror-spotting' algorithm.

2017-11-22

A Response Solution to Cyber Attacks

Verint has a cyber security solution designed for customers with large security operations centre which uses data mining software.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Dubex

Dubex

Dubex is Denmark's leading business-oriented IT security specialist.

BlackBerry Cybersecurity

BlackBerry Cybersecurity

Blackberry provides intelligent security software and services to enterprises and governments around the world.

Surevine

Surevine

Surevine builds secure, scalable collaboration solutions for the most security conscious organisations, enabling collaboration on their most sensitive information.

AppOmni

AppOmni

AppOmni is the only SaaS CSPM solution that gives teams all the tools they need to be successful – from security posture management to monitoring and detection to continuous compliance.

InfoExpress

InfoExpress

InfoExpress provides network security solutions that enhance productivity and security through better visibility, improved security, and automating device and mobile access to the network.

North American International Cyber Summit

North American International Cyber Summit

The North American International Cyber Summit brings together experts from around the globe to provide timely content and address a variety of cybersecurity issues impacting the world.

InfoSec Conferences

InfoSec Conferences

InfoSec Conferences is an online directory of infosec conferences. We list every single Information Security conference, event and seminar within every niche in Cybersecurity.

Phakamo Tech

Phakamo Tech

Phakamo Tech offers a full set of governance, risk, compliance, cybersecurity and Microsoft Cloud services that include consulting, planning, implementation and cyber incident response.

Oxford Internet Institute - University of Oxford

Oxford Internet Institute - University of Oxford

The Oxford Internet Institute is a multidisciplinary research and teaching department of the University of Oxford, dedicated to the social science of the Internet.

SOC Prime

SOC Prime

SOC Prime is the only Threat Detection Marketplace where researchers monetize their content to help security teams defend against attacks easier, faster and more efficiently than ever.

Yogosha

Yogosha

Yogosha is a crowdsourced cybersecurity platform enabling a win-win collaboration with the most talented hackers to detect and fix vulnerabilities on your most critical systems.

Aravo Solutions

Aravo Solutions

Your Extended Enterprise is full of hidden risks – Aravo makes them visible, measurable, and manageable.

ProArch

ProArch

ProArch is a global team of multidisciplinary experts in cloud, infrastructure, data analytics, cybersecurity, compliance, and software development.

Denodo

Denodo

Denodo transforms the way organizations operate by unifying their data assets in real time and making data ubiquitous and secure to all users and business applications.

GO Business

GO Business

GO Business are a specialised B2B team within GO that caters to the communication needs of the local business community in Malta.

RedLattice

RedLattice

RedLattice are at the cutting edge of tool development and AI-assisted vulnerability research in cybersecurity.