NEWS > Cybersecurity News


« Back to News

2016-12-19

Putin Personally Interfered With The US Election

US intelligence believes that Vladimir Putin was personally involved in election hacking in a vendetta against Hillary Clinton.

2016-12-16

MI6 Spies Infiltrate ISIS HQ

British spies are risking their lives daily in Islamic State heartlands to “take the fight to the enemy,” say MI6.

2016-12-13

Japan Aims For No.1 Supercomputer In 2017

Japanese, Chinese and French scientists are competing hard for the title of running the biggest, fastest and most efficient supercomputer.

2016-12-12

How Much Do IT Graduate & Intern Jobs Currently Pay?

In the Technology industry it’s hard for job seekers to know what they’re worth. It’s even harder when they’re new to the rat race.

2016-12-12

A Simple Way To Make Online Banking Safe. Really.

The City of London Police had considered asking financial regulators to make individual savers, rather than banks, liable for fraud losses.

2016-12-12

Codebreakers: Cybersecurity School At Bletchley Park

Bletchley Park is once again set to host some of the UK’s brightest minds, but this time they will be trying to protect codes, rather than break them.

2016-12-09

China's Great Wall Into Russian Cybersecurity

The Kremlin has joined forces with Chinese authorities to bring the internet and its users under greater state control.

2016-12-09

Critical Cybersecurity Protocols To Implement

Employees in the office or out and about are commonly using mobile devices, yours and theirs. Your network is vulnerable wherever they are.

2016-12-09

AI Ushers In A Whole New Era Of Hacking

Hackers won't necessarily always be human. AI promises to revolutionise cybersecurity and could one day become the go-to hacking tool.

2016-12-14

IBM Watson Fights Real-Time Cyber Crime

IBM's Watson supercomputer is embarking on its biggest challenge yet: Preventing cybercrime in finance, healthcare and elsewhere.

2016-12-14

Behavior Analytics Tools For Cyber-Security

Behavior Analytics is the hot new proposition in enterprise cybersecurity, used to detect abnormal patterns in network data.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Intruder

Intruder

Intruder is a cloud-based vulnerability scanner that finds cyber security weaknesses in your digital infrastructure, to avoid costly data breaches.

European Cybercrime Training and Education Group (ECTEG)

European Cybercrime Training and Education Group (ECTEG)

The primary aim of ECTEG is to enhance the coordination of cybercrime training, by identifying opportunities to build the capacity of countries to combat cybercrime

ControlCase

ControlCase

ControlCase provide solutions that address all aspects of IT-GRCM (Governance, Risk Management and Compliance Management).

Inavate Consulting

Inavate Consulting

Inavate Consulting are experts in defining and implementing information assurance solutions and governance frameworks. Our ISO27001 consultants are the most experienced in the industry.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ChainSecurity

ChainSecurity

ChainSecurity provides products and services for securing smart contracts and blockchain protocols and conducts R&D in the areas of security, program analysis, and machine learning.

Google for Startups

Google for Startups

Google for Startups is Google’s initiative to help startups thrive across every corner of the world.

Secure-IC

Secure-IC

Secure-IC provide end-to-end, best-of-breed security expertise, solutions, and hardware & software technologies, for embedded systems and connected objects.

7layers

7layers

7layers has established itself as one of the world’s leading test house groups for mobile devices and the growing number of wireless devices, modules and chipsets.

ConnectSecure

ConnectSecure

ConnectSecure (formerly CyberCNS) is a global cybersecurity company that delivers tools to identify and address vulnerabilities and manage compliance requirements.

Solvere One

Solvere One

Solvere One is a managed service provider (MSP) focused on corporate consulting and partnership.

Pacific Global Security Group

Pacific Global Security Group

Pacific Global Security Group offers an intelligence-driven focus on all aspects of cybersecurity for IT/ICS/OT.

Delinea

Delinea

Delinea is a leading provider of cloud-ready privileged access management (PAM) solutions that empower cybersecurity for the modern, hybrid enterprise.

MIS Solutions

MIS Solutions

MIS Solutions is a managed cloud and IT security partner making technology work for you.

CelcomDigi

CelcomDigi

CelcomDigi aspire to be Malaysia’s top Telco-Tech company, transforming beyond core connectivity to lead digitalization and innovation as part of nation-building.

OryxAlign

OryxAlign

OryxAlign offer managed IT and cyber security, cloud and digital transformation, and tailored professional and consulting services.