NEWS > Cybersecurity News


« Back to News

2017-04-05

The Cusp Of Merging Human With Machine

We are at the point where computers and machines are no longer going to be simply tools. Computers are becoming, literally, part of us.

2017-02-21

Russian Hackers using new Viruses for Attacks

State-sponsored Russian hackers are using a new type of virus designed to attack critical Ukrainian infrastructure such as the power grid and financial system, a senior Ukrainian state security official said recently.

2017-02-21

Guide To The Internet of Things

You’ve likely heard the phrase Internet of Things, or IoT, at some point if you have been following any tech news in the last several years.

2017-03-28

Hamas Upgrades Cyber Espionage Capability

Non-state political groups like Hamas have developed state-like hacking, espionage and surveillance capabilities.

2017-02-21

Wikipedia's editors cut out the Daily Mail

News that a few dozen Wikipedia editors had decided that the Daily Mail should be “generally prohibited” from being used as a source caused consternation among many in the media.

2017-03-24

Stealthy Malware Is Going Mainstream

Fileless malware avoids detection by hiding its payload in secluded spots, like a computer’s RAM or kernel, independent of hard drive files to run on.

2017-03-27

Data Breaches Attack All Parts Of A Business

Be Prepared: Data breaches are an enterprise wide problem involving top managers, legal counsel, HR, PR & other business stakeholders.

2017-03-23

Ethics of Drones, Remote Weapons and Robots

Remote and autonomous weapons raise new questions about the boundaries between peace and war, and the nature of future conflicts.

2017-02-21

Robots Will Repair Satellites In Space

The Pentagon is developing robots that can repair satellites in space, more than 20,000 miles above Earth.

2017-03-25

UK Accused Of 'full-frontal attack' On Whistleblowers

The British government’s legal advisers have been accused of launching a “full-frontal attack” on whistleblowers in the propssed Espionage Act

2017-03-20

Law to Imprison Journalists for Publishing Leaks

Espionage Act: A new law designed to tackle international espionage could be used to imprison British journalists who obtain leaked material.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Cyberis

Cyberis

Cyberis are pioneers in customer-focussed information security. Since 2011, we’ve been helping businesses protect their brands, customers and reputation.

CIO

CIO

CIO provides technology and business leaders with insight and analysis on information technology trends

Mimecast

Mimecast

Mimecast delivers cloud-based email management for Microsoft Exchange and Microsoft Office 365 including archiving, continuity and security.

Miller Group

Miller Group

Miller Group is an IT managed service provider. We proactively monitor and manage your entire business computer network. Services include backup & recovery and cyber security.

Atomicorp

Atomicorp

Atomicorp, the leader in Secure Linux, is a developer of solutions for the protection and support of cloud, virtual, shared, and dedicated web hosting environments.

Delta Risk

Delta Risk

Delta Risk is a global provider of managed security services and cyber security risk management solutions to government and private sector clients.

Vicarius

Vicarius

Vicarius’ mission is to revolutionize vulnerability management from problem detection to proactive problem resolution.

Asoftnet

Asoftnet

Asoftnet are specialists in IT security, IT forensics, IT service, websites, applications and mobile solutions.

Marcus Donald People

Marcus Donald People

Marcus Donald People is a UK IT recruitment specialist covering the following sectors: Infrastructure & Cloud, Information Security, Development, Business transformation.

African Cyber Security

African Cyber Security

African Cyber Security and it's partners, have the expertise and skills to provide holistic solutions for companies, institutions and government.

CUJO AI

CUJO AI

CUJO AI is the global leader in the development and application of artificial intelligence to improve the security, control and privacy of connected devices in homes and businesses.

QGroup

QGroup

QGroup has been re-designing the consultancy industry since 2012. We're a rapidly expanding group of consulting companies that deliver bespoke IT services including cybersecurity.

watchTowr

watchTowr

Continuous Attack Surface Testing, with the watchTowr Platform. The future of Attack Surface Management.

Google Safety Engineering Center (GSEC)

Google Safety Engineering Center (GSEC)

GSEC Málaga is an international cybersecurity hub where Google experts work to understand the cyber threat landscape and to create tools that keep users around the world safer online.

Cyberagentur (Cyber Agency)

Cyberagentur (Cyber Agency)

Cyberagentur is the Federal Agency in Germany for innovation in cybersecurity. Our mission is to advance research and groundbreaking innovations in the field of cybersecurity and related technologies.

BlackSignal Technologies

BlackSignal Technologies

BlackSignal Technologies provides cybersecurity, digital signal processing and electronic warfare products to help DOD and IC agency customers counter near-peer threats and security challenges.