NEWS > Cybersecurity News


« Back to News

2017-08-24

Firms Underrate The ‘Seismic Aftershock’ Of An Attack

UK businesses are overconfident in their cybersecurity planning & underestimate the damage of the “seismic aftershock” following a breach.

2017-09-01

What is Machine Learning?

Building systems that learn from data is a better way to solve complex problems, given enough meaningful data to learn from.

2017-08-23

What Is A Good Cyber Strategy?

Cybersecurity has never been more important for business. Cyber-attacks are becoming ever more ambitious and a systematic response is needed.

2017-08-31

You Might Need To Hire AI Expertise Sooner Than You Think

It is fast becoming a vital part of IT strategy and to make the most of AI in the enterprise, you have to have a strong team in place.

2017-08-24

Cyber Security Risks Of Cloud Computing

The global cloud market is expected to grow to $190+ billions by 2020. Increased cloud adoption calls for better understanding of cloud security threats.

2017-08-23

HBO Offers Hackers $250,000 'bug bounty'

HBO reportedly offered $250,000 in ransom to the group that hacked its servers under the guise of a “bug bounty”.

2017-08-22

Chinese Satellite Sends Hack-Proof Messages

The Micius communications satellite has successfully sent "hack-proof" messages using quantum encryption.

2017-08-14

Ukrainian Postal Service Hit By Cyber Attack

Ukraine's national postal service has been hit by a two-day-long cyber-attack targeting its online system that tracks parcels.

2017-08-22

Artificial Intelligence: A Warning

Elon Musk repeats his warning about the dangers of AI, saying it poses “vastly more risk” than the apparent nuclear capabilities of North Korea does.

2017-08-21

Loss Of Cyber Expertise Is A Problem For Trump

The Trump administration has lost significant individuals serving in top cybersecurity roles across the federal government. That's a problem.

2017-08-21

Fighting Digital Crime: Evolving Police Methods

As the cyber-crime landscape continues to evolve, methods of policing it must change as well.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Bryan Cave LLP

Bryan Cave LLP

Bryan Cave LLP is a global business and litigation law firm. Practice areas include Data Privacy and Security.

Guardtime

Guardtime

Guardtime's Black Lantern platform provides real-time cybersecurity and data-centric asset protection.

Systancia

Systancia

Systancia offer solutions for the virtualization of applications and VDI, external access security, Privileged Access Management (PAM), Single Sign-On (SSO) and Identity and Access Management (IAM).

Radiflow

Radiflow

Radiflow is a leading provider of cyber security solutions for critical infrastructure networks (i.e. SCADA), such as power utilities, oil & gas, water and others.

LEADS

LEADS

LEADS is considered as a leading ICT Solution Provider and an IT partner of choice in Bangladesh.

Perch Security

Perch Security

Perch is a co-managed threat detection and response platform backed by an in-house Security Operations Center (SOC).

ImmuniWeb

ImmuniWeb

We Simplify, Accelerate and Reduce Costs of Security Testing, Protection and Compliance.

RegScale

RegScale

RegScale helps organizations comply in real-time with multiple compliance requirements (NIST, CMMC, ISO, SOX, etc), scalable to meet the needs of the entire enterprise.

Sansec

Sansec

Sansec is the global leader in eCommerce malware and vulnerability detection. We help you to stay ahead of hackers!

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Devolutions

Devolutions

Devolutions make best-in-class Privileged Access Management, Password Management, and Remote Connection Management solutions available to ALL organizations — including SMBs.

Infinipoint

Infinipoint

Infinipoint pioneers the first Device-Identity-as-a-Service (DIaaS) solution, addressing Zero Trust device access and enabling enterprises of all sizes to automate cyber hygiene.

Third Point Ventures

Third Point Ventures

Third Point brings deep technical expertise, a strong network of relationships, and decades of investing experience to add value to our partners throughout their journey from idea to IPO and beyond.

Jericho Security

Jericho Security

Jericho Security is on a mission to defend the world from the new threats of generative AI cyber attacks.

Pacific Certifications

Pacific Certifications

Pacific Certifications provide accredited certification, training and support services to help you improve processes, performance and products and services.

LiveAction

LiveAction

LiveAction’s Network Intelligence platform transforms complex data into actionable insights, providing organizations with a comprehensive view of their network.