NEWS > Cybersecurity News


« Back to News

2016-09-28

What To Do About Zero-Day Hacks

Zero Days exploits are so called because the victim has no time to fix the vulnerability. There is a growing market to defend against such attacks.

2016-09-28

Yahoo Data Breach Questions

Yahoo recently revealed that 500 million customer accounts have been compromised, following a major data breach. What happened?

2016-09-28

Encryption Gives Malware a Perfect Place to Hide

Nearly half of cyber-attacks this year have used malware hidden in encrypted traffic to evade detection.

2016-09-27

Country Eye App For The Rural Community

Country Eye: A free App for the UK Rural and Agriculture community to capture intelligence on rural crime & report the data to Police & agencies.

2016-09-28

Hacking Elections Is Easy

In most cases, US electronic voting systems are bare-bone, decade old computer systems that lack even rudimentary endpoint security.

2016-09-28

Australia Hardest Hit By Cybersecurity Skills Shortage

Career Opportunities: The lack of cyber security professionals is felt more acutely in Australia than in any other major economy.

2016-09-26

How To Use Cybersecurity Big Data Effectively

A survey of US Federal Agencies finds that the sheer volume of cybersecurity data is overwhelming and that most of it goes unused.

2016-09-27

Internet Takes The Wheel Inside Driverless Cars

Fully automated vehicles are teetering on the edge of commercial viability. Big manufacturers and startups are piling in.

2016-09-27

Cybercrime Inc. Hackers Model Themselves On Big Business

Cybercrime is an industry involving major criminal groups, with ecosystems as well-structured as the corporations they are attempting to target.

2016-09-26

Delete/Never-Use Google Allo: Says Snowden

Edward Snowden has warned people not to use Google’s new chat app, because it lets the company read everything that they say.

2016-09-26

Company Lost $44m Through One Email Fraud

A simple email fraud tricked one company's Finance Dept. into transferring 40m Euros to a fake foreign bank account.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

AirCUVE

AirCUVE

AirCUVE provide authentication and access control solutions for networks and mobile security.

ISC2

ISC2

ISC2 is an international, non-profit membership association for information security leaders. Our information security certifications are recognized as the global standard for excellence.

Averon

Averon

Averon's technology is the new gold standard for digital identity - the easiest, fastest and most secure verification solution for users on both WiFi and LTE.

NEC

NEC

NEC offers a complete array of solutions to governments and enterprises to protect themselves from the threats of digital disruption.

Raz-Lee Security

Raz-Lee Security

Raz-Lee Security is the leading security solution provider for IBM Power i, otherwise known as iSeries or AS/400 servers.

Untangle

Untangle

Untangle provides network security products designed specifically for the below-enterprise market, safeguarding businesses, home offices, nonprofits, schools and governmental organizations.

Liquid Technology

Liquid Technology

Liquid Technology provide DOD- and NIST-compliant data destruction and EPA-compliant e-waste disposal and recycling services throughout North America, Europe and Asia.

Security Weaver

Security Weaver

Security Weaver is a leading provider of governance, risk and compliance management (GRCM) software.

Phakamo Tech

Phakamo Tech

Phakamo Tech offers a full set of governance, risk, compliance, cybersecurity and Microsoft Cloud services that include consulting, planning, implementation and cyber incident response.

1Password

1Password

1Password combines industry-leading security with award-winning design to bring private, secure, and user-friendly password management to everyone.

Appsian Security

Appsian Security

Appsian provides powerful solutions that help organizations take control of their business critical data and financial transactions.

SubCom

SubCom

How Much Do You Trust Your Endpoint? With our ‘Habituation Neural Fabric’ based endpoint security platform, you can observe and manage the Trust Score of your endpoints in real-time.

VeriBOM

VeriBOM

VeriBOM is a SaaS security and compliance platform that helps protect you and your customers through automation, documentation, and transparency for every software application you build or run.

RIIG Technology

RIIG Technology

Our mission is to empower organizations with high-quality, verifiable data and advanced intelligence solutions, ensuring robust security and effective risk management.

National Critical Information Infrastructure Protection Centre (NCIIPC) - India

National Critical Information Infrastructure Protection Centre (NCIIPC) - India

NCIIPC's mission is to protect the Critical Information Infrastructure of India, from unauthorized access, modification, use, disclosure, disruption, incapacitation or destruction.

Monokee

Monokee

Monokee offers a solution that seamlessly integrates powerful Identity and Access Management (IAM) capabilities with a low/no code identity orchestrator.