NEWS > Cybersecurity News


« Back to News

2016-10-08

The Internet Is No Place For Elections

Political scientists and technical experts are saying public elections should stay offline. US Citizens cannot trust the internet with their vote.

2016-10-07

IBM’s Real -Time Cloud Platform For Financial Services

IBM has announced a new service called Financial Transaction Manager which will allow commercial banks to deploy real-time payments.

2016-10-05

Five Technologies Changing Our lives In Five Years

Analysts say a handful of technologies are poised to change our lives by 2021. What are they?

2016-10-05

Ever-Evolving Trojan Devices Infects Android Systems

The Trojan known as Android.Xiny continues to evolve and has gained the ability to infect a core Android system process.

2016-10-04

Cybersecurity Start-Ups Working With GCHQ

The UK's top security startups are invited to work with GCHQ in an effort to help protect against hackers and cyber attackers.

2016-10-04

Difficult: Attracting Women To Cybersecurity

Fighting Stereotypes: Women make up only 10% of the global cybersecurity workforce.

2016-10-04

State Sponsored Hackers: Finding The Country Behind The Attack

Security experts don't just want to know how a cyber attack happens, but what country the attack is coming from.

2016-10-05

Drone-Visuality: The Psychology Of Killing

The drone camera, and the technological nexus it is situated within, enables killing to become a networked phenomenon.

2016-10-03

UK’s New National Cyber Security Centre

Britain's war against the soaring number of cyber-attacks is to be led from a new HQ in the centre of London opened this week.

2016-10-03

Cyber Warfare TV Series

The Director of the acclaimed 'Zero-Days' documentary feature film is to make a new TV drama series provisionally titled 'Stuxnet'.

2016-09-30

What To Know About Space Security

Space is increasingly important to the planet’s infrastructure - but it is also a potential battleground.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

SGCyberSecurity

SGCyberSecurity

SGCyberSecurity is Singapore's No.1 Cyber Security portal. From this platform, you will be able to find useful articles, resources and connect with the security companies for your business needs.

KLC Consulting

KLC Consulting

KLC Consulting offers information assurance / Security, IT Audit, and Information Technology products and services to government and Fortune 1000 companies.

iONLINE

iONLINE

iONLINE delivers high quality IT services and solutions to businesses in Azerbaijan.

Hunters.AI

Hunters.AI

Hunters is the world's first autonomous hunting solution that leverages top-tier cyber expertise and AI to uncover hidden cyber threats.

Genians

Genians

Genians provides the industry’s leading Network Access Control (NAC) solution, which ensures full visibility of all IP-enabled devices regardless of whether they are wired, wireless, or virtual.

Flipside

Flipside

Information Security training provider specialized in personalized training and security awareness campaigns.

International Data Sanitization Consortium (IDSC)

International Data Sanitization Consortium (IDSC)

IDSC is a group composed of individuals and companies dedicated to standardizing terminology and practices across the data sanitization industry.

Xopero Software

Xopero Software

Xopero Software develops a comprehensive range of professional tools for protecting and restoring critical business data.

Zenity

Zenity

Zenity is the first and only security governance platform for low-code/no-code applications.

Nclose

Nclose

Nclose is a proudly South African cyber security specialist that has been securing leading enterprises and building our security portfolio since 2006.

Datapac

Datapac

Datapac is one of Ireland’s largest and most successful ICT solutions and services providers. We have been at the forefront of technology innovation in Ireland for the past three decades.

NexusTek

NexusTek

NexusTek is a managed IT services provider with a comprehensive portfolio comprised of end-user services, cloud, infrastructure, cyber security, and IT consulting.

Project Cypher

Project Cypher

Project Cypher leverages the latest cybersecurity developments, a world class team of hackers and constant R&D to provide you with unparalleled cybersecurity offerings.

ExactTrak

ExactTrak

ExactTrak provide embedded cyber security solutions for your digital devices – whenever and wherever you need them.

Tyto Athene

Tyto Athene

At Tyto Athene, we harness the power of technology to provide solutions that shape the future.

MIND

MIND

MIND is the first-ever data security platform that puts data loss prevention and insider risk management programs on autopilot, so you can automatically identify, detect and prevent data leaks.