NEWS > Cybersecurity News


« Back to News

2017-07-11

Ukrainian Security Call in FBI, NCA & Europol

Ukraine's SBU security service calls in international help & has branded the hugely damaging Petya attack an “act of cyber-terrorism”.

2017-07-10

Fraud And The Internet of Things

Cyber criminals have the funding and resources to infect millions of IoT gadgets with disruptive and potentially hazardous mechanisms.

2017-07-10

Trump’s Joint Cybersecurity Unit With Russia – It’s Not Happening

Reverse Gear: Plans for a joint cyber unit brought immediate ridicule amid concerns it was a Russian ruse to collect secrets.

2017-07-10

GCHQ Unveils Its Cybersecurity Playbook

The UK National Cyber Security Center has created four “simple and free measures” that public sector bodies can implement immediately.

2017-07-10

Prices For Stolen NSA Exploits Go Higher

Both Petya and Wannacry are strains of malware derived from NSA exploits stolen by the mysterious Shadow Brokers. Now they want more money.

2017-07-10

Fallout From Petya On Global Shipping

Petya shows the scale of the damage a computer virus can unleash on a technology dependent and inter-connected industry.

2017-07-07

India Wants A Big Windows Discount From Microsoft

75% Off: With 57 million computers in India, the country could save billions of dollars in costs if Microsoft agrees to the steep discount.

2017-07-07

Germany Gets Tough On Social Media

Social media companies in Germany face fines of up to 50m euros if they fail to remove "obviously illegal" content in time.

2017-07-07

Petya’s Ransomware Attacks Have Failed

A Weapon Of Mass Disruption: If the motive behind the Petya ransomware attacks was financial gain, it was far from a success.

2017-07-07

Is It Really Possible to Protect Your Health Data?

It is possible to protect health data, but only if governments, healthcare providers & individuals see it as a top priority. Opinion by Sandra O'Hare.

2017-07-06

Snapchat Map Raises Child Safety Concern

Social Media & Privacy: An update to Snapchat can show publicly posted images on a searchable map raises safety concerns among parents.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIIS Cyber Initiative

MIIS Cyber Initiative

The Cyber Initiative's mission is to assess the impact of the information age on security, peace and communications.

Trustwave

Trustwave

Trustwave is a leader in managed detection and response (MDR), managed security services (MSS), consulting and professional services, database security, and email security.

ThreatSTOP

ThreatSTOP

ThreatSTOP is a cloud-based automated threat intelligence platform that converts the latest threat data into enforcement policies to stop attacks before they become breaches.

CICRA

CICRA

CICRA is Sri Lanka's pioneering cyber security training and consultancy provider.

Red4Sec

Red4Sec

Red4Sec are experts in ethical hacking, audits of web and mobile applications, code audits, cryptocurrency audits, perimeter security and incident response.

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

GCSCC's work is focused on developing a framework for understanding what works, what doesn’t work and why – across all areas of cybersecurity capacity.

AuthLite

AuthLite

With AuthLite, you can keep using all your existing software, with added two-factor authentication security placed exactly where you need it.

NetSPI

NetSPI

NetSPI is an information security penetration testing and vulnerability assessment management advisory firm.

Cyturus Technologies

Cyturus Technologies

Cyturus Technologies delivers cybersecurity business risk quantification services using our proprietary Adaptive Risk Model (ARM).

Binary Security AS

Binary Security AS

Binary Security is a Norwegian information security consultancy company. We are specialists at application security, penetration testing and secure code reviews.

SecureTech360

SecureTech360

SecureTech360 is a cybersecurity and IT consulting firm whose principals have extensive experience in Cybersecurity and Information Technology.

Sencode Cyber Security

Sencode Cyber Security

Sencode provides a range of IT security solutions and services, including penetration testing and cyber awareness training to help mitigate the growing risks to your corporate infrastructure.

Ipstack

Ipstack

Ipstack offers one of the leading IP to geolocation APIs and global IP database services worldwide. Protect your site and web application by detecting proxies, crawlers or tor users at first glance.

Goldilock

Goldilock

Goldilock is redefining how sensitive data, devices, networks and critical infrastructure can be secured.

CloudGuard

CloudGuard

CloudGuard is an AI-driven XDR platform that helps organisations to proactively detect and automatically remediate threats in real-time.

Lansafe

Lansafe

Lansafe stands as a leading managed service provider in the UK, seamlessly integrating IT, Telecoms, Security, Electrical and Cyber Security solutions.