NEWS > Cybersecurity News


« Back to News

2017-04-03

No Easy Fix For SME Cybersecurity

Small and medium sized businesses are frequent targets for cyber attacks and their results can be devastating.

2017-04-01

Wikileaks Vault 7 And The CIA Hacking Arsenal

The un-cover-up, the fact of the leak itself, is probably more significant than the substance of what has thus far been revealed.

2017-04-03

DeepMind Uses Blockchain To Track Health Data

Verifiable Data Audit: DeepMind Health will work with the NHS to track patient personal data in real-time.

2017-04-03

Cyber Insurance: 7 Questions To Ask

Insurance for cybersecurity is different from other types of insurance because the nature of threats is constantly changing.

2017-03-31

WikiLeaks Will Share CIA's Hacking Secrets

Tech companies are not lining up to accept Wikileaks offer to get access to the stolen CIA hacking tools to help fix software vulnerabilities.

2017-03-30

Here Comes China’s Crypto-Currency

Forget about Bitcoin. China is busy converting the Renimbi to digital and this crypto-currency has the backing of an entire nation.

2017-03-30

Hong Kong’s 3.7 Million Voters Exposed in Massive Breach

Hong Kong has suffered its biggest ever data breach after the personal details 3.7 million voters were lost on stolen laptops.

2017-03-29

WikiLeaks Dump Shines Light On US Intelligence’s Zero-Day Policy

Zero Days exploits used to create and promulgate a software patch are goldmines for US intelligence agencies.

2017-03-29

Board-level Cyber Literacy Is Low, Discomfort High

Business leaders who continue to view cybersecurity as a matter for the IT department leave their companies exposed to major risks.

2017-03-29

Drones For Rail & Road Tunnel Inspections

Road & rail tunnels must be inspected regularly to detect anomalies. Singapore thinks drones can replace manned inspection teams for this task.

2017-03-29

Google Search For A Fraud Victim

US judge orders Google to provide information on any internet user found to have searched for one of four variations of a fraud victim’s name.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Lumeta

Lumeta

Lumeta’s cyber situational awareness platform is the unmatched source for enterprise network infrastructure analytics and security monitoring for breach detection.

Applause

Applause

Applause provides real-world software testing for functionality, usability, accessibility, load, localization and security.

Integrity360

Integrity360

Integrity360 provide fully managed IT security services as well as security testing, integration, GRC and incident handling services.

Lawley Insurance

Lawley Insurance

Lawley is a full-service, independent insurance agency. Specialty insurance products include Cyber Security.

Elemendar

Elemendar

Elemendar Artificial Intelligence reads cyber threat reports written by humans and translates them into industry-standard, machine-readable and machine-actionable data.

Search Guard

Search Guard

Search Guard® is an Open Source security suite for #Elasticsearch and the entire #ELK stack that offers encryption, authentication, authorization, audit logging and multi tenancy.

C3i Hub

C3i Hub

C3i Hub aims to address the issue of cyber security of cyber physical systems in its entirety, from analysing security vulnerabilities to developing tools and technologies.

SubCom

SubCom

How Much Do You Trust Your Endpoint? With our ‘Habituation Neural Fabric’ based endpoint security platform, you can observe and manage the Trust Score of your endpoints in real-time.

Park Place Technologies

Park Place Technologies

Park Place Technologies' mission is to drive uptime, performance and value for critical IT infrastructure.

Primus Institute of Technology

Primus Institute of Technology

At Primus Institute of Technology our mission is to inspire, support, and empower current and aspiring IT professionals through training and career development workshops.

SektorCERT

SektorCERT

SektorCERT is the cybersecurity center for the critical infrastructure sectors in Denmark. We help detect and handle when critical infrastructure is exposed to cyber attacks.

SureCloud Cyber Services

SureCloud Cyber Services

Our Cyber Testing capability has been honed since we were founded in 2006 as a disrupter in the penetration testing market.

Pixee

Pixee

Pixee fixes vulnerabilities, hardens code, squashes bugs, and gives engineers more time to focus on the work that counts.

Advania UK

Advania UK

Advania are one of Microsoft’s leading partners in the UK, specialising in Azure, Security, Dynamics 365 and Microsoft 365.

STACK Cybersecurity

STACK Cybersecurity

STACK Cybersecurity serves as a strategic partner, guiding you through the intricate and dynamic cybersecurity landscape.

Nexio

Nexio

We are Nexio. We help organisations take every NEXT step toward their accelerated digital transformation.