NEWS > Cybersecurity News


« Back to News

2016-09-14

Cybercrime & Cyberwar: A Spotter's Guide

Cybercriminals are as varied as other Internet users: They have different tools, objectives & specialties. Understanding them can defend against them.

2016-09-10

Critical Infrastructure Is The Next Target

The way we think about cyber-attacks changed when Ukraine experienced the first recorded power outage caused by a cyber-attack.

2016-09-13

Canadian Companies Vulnerable To Cyber-Attacks

Canadian organizations aren’t prepared for the rising caliber of attacks, according to Deloitte’s 2015 cyber security survey.

2016-09-17

Australian Government Networks Hacked

Sensitive Australian Government and corporate computer networks have been penetrated by sophisticated cyber-attacks.

2016-09-19

UAE Using Israeli Spy Technology

The United Arab Emirates uses Israeli malware capable of turning Apple’s iPhones into remote spying devices to clamp down voices of dissent.

2016-09-09

Are US Voting Machines Secure From Hackers?

Some states have declined to scan voting systems for hackers ahead of the presidential US elections.

2016-09-08

Islamic State Members Embedded In Government

The Kuwaiti interior ministry has arrested a governmental insider for hacking the official websites and spreading the IS propaganda.

2016-09-09

Cyber Vulnerability Identified In Major Weapons Systems

The US Pentagon is worried about uncovering cyber flaws in it's strategic weapons systems.

2016-09-21

Who Are We In the Cyber World?

Reading List: Mary Aiken's book 'The Cyber Effect' is about how the Internet is shaping development, behavior and our perception of the world.

2016-09-07

Rio 2016 Olympic Games: IoT Technologies Win

The Rio 2016 games have brought a new aspect of technology to sports for live stadium audiences as well as television viewers internationally.

2016-09-15

Cybercrime Isn't The Reason Why Cash Remains King

The "cashless" world has proven unreliable in several ways and technology is actually supporting cash in many instances.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

RU-CERT

RU-CERT

RU-CERT is the CSIRT / CERT team of the Russian Federation.

Holm Security

Holm Security

Holm Security are taking vulnerability assessment into the next generation as a cloud service.

UL Solutions

UL Solutions

UL Solutions is a safety, security and compliance consulting and certification company. Areas covered include cyber security.

S2 Grupo

S2 Grupo

S2 Grupo is the benchmark company in Europe and Latin America, for Cyber Intelligence and mission critical systems operations.

Fraud.com

Fraud.com

Fraud.com ensures trust at every step of the customer's digital journey; this complete end-to-end protection delivers unified identity, authentication and fraud detection and prevention.

Fugue

Fugue

Fugue ensures cloud infrastructure stays in continuous compliance with enterprise security policies.

Marvell Technology Group

Marvell Technology Group

Marvell is a semiconductor company providing solutions for storage, processing, networking, security and connectivity.

Anitian

Anitian

The Anitian Compliance Automation platform builds, configures, and monitors cloud environments to accelerate compliance for standards such as FedRAMP, PCI, ISO/GDPR and CJIS.

AttackIQ

AttackIQ

AttackIQ delivers continuous validation of your enterprise security program so you can strengthen your security posture and your response capabilities.

Red River

Red River

Red River is a technology transformation company, bringing 25 years of experience and mission-critical expertise in analytics, cloud, collaboration, mobility, networking and security solutions.

Traced

Traced

At Traced, our aim is to redefine mobile cyber security to provide the best possible protection to everyone against breaches of privacy and security.

Sentra

Sentra

Sentra is focused on improving data security practices within the cloud, mitigating the risks of damaging data leaks by providing comprehensive visibility into critical data assets.

Babble

Babble

Babble is a Unified Comms, Contact Centre and Cyber Solutions provider. We believe in making next-generation technology simple to use, deploy and manage.

Ultima

Ultima

Ultima are on a mission to help businesses unlock their true potential by using the right IT to protect your company’s revenue and reputation – 24/7.

EGUARDIAN

EGUARDIAN

EGUARDIAN serves as a Value-Added Distributor and technology enabler in the APAC region with the aim of further expanding globally and cater to the needs of the demands with the emerging technology.

ViroSafe

ViroSafe

ViroSafe is a leading value-added distributor of IT security solutions in Norway.