NEWS > Cybersecurity News


« Back to News

2017-09-07

A New Form Of Ransomware Attacks UK Hospital

A UK NHS hospital group which suffered at the hands of the WannaCry outbreak has fallen victim to a further ransomware attack.

2017-09-12

IoT For Business & Creating 'Digital Twins'

If your organisation is planning to leverage the Internet of Things it needs to become familiar with the concept of the “digital twin.”

2017-09-08

Crime Has Become Cybercrime

'Ordinary' criminals are making an easy transition to becoming cybercriminals and are beginning to remodel their organizations for greater efficiency.

2017-09-11

Is The US Constitutional Right To Free Speech Threatened Online?

The fate of the Daily Stormer, a Nazi hate site that has been kicked off the Internet, signals the increasing irrelevance of the 1st Amendment.

2017-09-08

US Navy’s State-of-The-Art AI Drone

The US Navy is looking for a drone that can fly over a damaged airfield and come up with a plan to get planes back in the air quickly.

2017-09-06

A Revolution In Warfare Made Possible By AI

AI is revolutionising warfare in ways similar to the invention of nuclear arms and in the same way could ultimately destroy humanity.

2017-09-06

4 Ways to Simplify Your Business Data Management

Enterprise IT managers have more data to manage than ever. Is your business trying to to manage data growth without scaling the budget?

2017-09-06

'Killer Robot' Warfare Is Coming Closer.

Top robotics experts write a letter to the UN calling for a ban on the development of "killer robots" and warning of a new arms race.

2017-09-05

ISIS Video Adds More Terror In Spain

Following the murderous assaults in Barcelona ISIS have released a new video threatening Spain with more terrorist attacks.

2017-09-05

UK Deal With EU On Post-Brexit Data Sharing

The UK is negotiating a deal over data sharing with the EU in which there are no substantial regulatory changes as a result of Brexit.

2017-09-05

Russian Hackers Feel The Heat

Used to operating with impunity, Russian cyber criminals are getting worried that US prosecutions will lead to further arrests and close them down.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Mielabelo

Mielabelo

Belgian consulting firm providing services in the security and compliance of information systems and IT service management.

WireX Systems

WireX Systems

WireX is an innovative network intelligence and forensics company that is changing the way businesses resolve cyber-attacks.

SparkCognition

SparkCognition

SparkCognition’s AI-powered solutions enhance cybersecurity, identify and prevent equipment failures before they happen, and provide prescriptive intelligence for maintaining your most critical assets

XignSYS

XignSYS

XignSys develops innovative password-free and user-friendly Authentication solutions and electronic signature systems for B2B and B2C applications.

BELAC

BELAC

BELAC is the national accreditation body for Belgium.

ConvergeOne

ConvergeOne

ConvergeOne is a leading global IT services provider of collaboration and technology solutions including cybersecurity.

Cord3

Cord3

Cord3 delivers data protection, even from trusted administrators – or hackers posing as administrators – with high privilege.

Nexon Asia Pacific

Nexon Asia Pacific

Nexon solutions include cloud infrastructure and services, unified communications, managed security services, business continuity, secured high-performance network and business applications.

Astrix Security

Astrix Security

Astrix enables security teams to instantly see through the fog of connects and detect redundant, misconfigured and malicious third-party exposure to their critical systems.

BrainStorm

BrainStorm

BrainStorm Threat Defense takes a new human-focused approach to security awareness that traditional training lacks. It’s a cutting-edge platform to make your users more security savvy.

Cryptr

Cryptr

Cryptr provides plug and play authentication to manage all your authentication strategies in one place with just a few lines of code.

HTL Support

HTL Support

HTL Support, your trusted partner for comprehensive IT support in London. We specialize in delivering top-tier IT solutions tailored to both large enterprises and small businesses.

ITButler e-Services

ITButler e-Services

At IT Butler, our mission is crystal clear: we are dedicated to providing top-tier cybersecurity solutions and best-practice methodologies to secure and enhance your digital infrastructure’s resilienc

SecAI

SecAI

SecAI is an innovative threat intelligence-driven, and AI-powered vendor aiming at cyber threat detection and response.

Sandfly Security

Sandfly Security

Sandfly focuses on Linux security that is high performance, high stability, high compatibility, and low risk.

Kali Linux

Kali Linux

Kali Linux is an open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing.