NEWS > Cybersecurity News


« Back to News

2017-02-20

Is There A Truly Secure Messaging App?

More messaging apps than ever support end-to-end encryption. Should they prioritize convenience or security?

2017-02-20

Udacity Offer Deep IT Learning Programs & Nano-Degrees

Startup Udacity is using innovative methods of promoting large scale vocational IT education with focused foundation programs & 'nano degrees'.

2017-02-18

Italian Brother & Sister Cyber Spies Arrested

Two Italians stand accused of having spied on Italian politicians, state institutions, law enforcement agencies, businesses & the Vatican.

2017-02-08

Auditors Need To Know About Cyber Security

Information Security: Auditors have an obligation to educate themselves about cyber security technology if they are to do their job properly.

2017-02-18

Action Fraud: Social Media Used to Steal Charity Donations

An emerging fraud where social media platforms are used to attract donations to overseas welfare charities that do not exist.

2017-02-18

Georgia - A State Of Cybersecurity

The US state of Georgia is building a training center that’s designed to teach how to combat hacking and other forms of cyberwarfare.

2017-02-18

Old IT Networks Stop New IoT Innovation

The Internet of Things (IoT) isn’t all brand-new, cutting-edge technology. In fact, some of it’s already suffering through painful upgrade cycles.

2017-02-16

Browser Autofill Can Be Used To Steal Data

Your browser or password manager’s autofill might be giving away your information to phishers using hidden text boxes on websites.

2017-02-16

One Insurer Plans To Replace Humans With AI

A Japanese insurance company reportedly is replacing 34 workers with an artificial intelligence system. Is this the beginning of a trend?

2017-02-16

The Limits Of Cyber Warfare

Future wars might be waged online, but evidence from recent fighting between Russia and Ukraine suggests it won't be that simple.

2017-02-15

WikiLeaks Wants A Database To Verify Twitter Users

After years of campaigning for transparency WikiLeaks now says it wants to build a surveillance database of it's own.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The Networking People (TNP)

The Networking People (TNP)

TNP supplies independent advice allowing large organisations to design, build and operate their own networks independently of the established telecoms companies.

CyberSecurityJobsite.com

CyberSecurityJobsite.com

CyberSecurityJobsite.com is a specialist job board designed to attract candidates working within Cyber Security, Information Security or Information Assurance.

Bottomline Technologies

Bottomline Technologies

Bottomline Technologies is an innovator in business payment automation technology, helping companies make complex business payments simple, smart and secure.

Gospel Technology

Gospel Technology

Gospel presents a totally new way of accessing and controlling data which is enterprise grade scalable, highly resilient, and secure.

UPX Technologies

UPX Technologies

UPX Technologies is one of the largest digital security centers in Brazil providing full protection for data, networks and content.

Advisera 27001Academy

Advisera 27001Academy

Advisera is a market leader in providing documentation and online support for the implementation of business standards including ISO 27001, ISO 22301 and EU GDPR.

Salient Law

Salient Law

Salient Law is a virtual law firm that specialises in advising providers and users of technology on contracts involving technology.

Acceptto

Acceptto

Acceptto offers the first unified and continuous authentication identity access platform with No-Password.

Phoenix Cybersecurity

Phoenix Cybersecurity

Phoenix Cybersecurity Services and Managed Security Services help clients just like you take full advantage of leading cybersecurity technologies and industry best practices.

Stanley Reid & Company (SRC)

Stanley Reid & Company (SRC)

Stanley Reid & Co is an Executive and Technical Search Firm serving the commercial market and the US Intelligence & Defense community. Our areas of expertise include Cybersecurity.

L3Harris Technologies

L3Harris Technologies

L3Harris Technologies is a global aerospace and defense technology innovator, delivering solutions to meet mission-critical needs across air, land, sea, space and cyber domains.

Larsen & Toubro Infotech (LTI)

Larsen & Toubro Infotech (LTI)

LTI is a global technology consulting and digital solutions company with operations in 33 countries.

Secure Diversity

Secure Diversity

Secure Diversity is an innovative non-profit organization with leaders that think out of the box to create strategies & solutions to increase diversity in the cybersecurity industry.

Hacker School

Hacker School

Hacker School offers technology motivated training programs that provide Cyber Security Certifications and Courses.

RunReveal

RunReveal

RunReveal's mission is to make sure no breach goes undetected. That means having a product that is accessible and effective for companies of all sizes.

Lumos

Lumos

Lumos, the Unified Access Platform to manage all access to apps and data.