NEWS > Cybersecurity News


« Back to News

2016-07-26

Cloud Video Architecture Improves Emergency Services Response

Visual data can be critical in knowing where to send emergency services personnel, tracking suspects, or detecting hazardous materials.

2016-07-25

Cybersecurity: The Human Dynamic

Ultimately, cyber security is governed by choices made by a human sat at a keyboard.

2016-07-25

Criminals Invent Clever New Way To Plant Banking Malware

Watering Hole Attack: Malicious executable bug contained inside a file that installed a legitimate administrative tool.

2016-07-25

Civil Liberties Group Crashes Thailand Government Website

A cyber-attack by a Thai group opposed to the “Single Gateway” brought down a major government website.

2016-07-25

Cyberwar Against Islamic State Is Struggling

The so-called "cyber bombs" that the US military is virtually dropping on Islamic State targets aren't working as well as first hoped.

2016-07-22

In The UK Cybercrime Has Overtaken Traditional Crime

In a sign of the times, cybercrime has now surpassed all other forms of UK crime according to the National Crime Agency (NCA).

2016-07-22

Artificial Brains to Protect Against Cyberattacks

Solutions that apply machine learning to artificial intelligence are the next step in cybersecurity.

2016-07-22

Improved Security For The Internet-of-Things

Inherently Insecure: Connectivity between IoT devices is often exploited, especially when it involves in-transit data encryption. What can be done?

2016-07-21

'Zero Days' - Hidden World of Cyber Warfare

Documentary: An enthralling espionage thriller about Stuxnet, complete with assassinations and an arsenal of bits and bytes.

2016-07-22

Ransomware Victims Run Into Millions

13m Americans have been targeted by ransomware, malicious software that blocks computer access until the victim pays a sum of money.

2016-07-21

Russia Claims ‘Increase in Cyberattacks by West Spies’

The Kremlin worries that its government agencies are under increasing western attack, and is concerned about skill shortages in government.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

SafeCharge

SafeCharge

SafeCharge is a global provider of technology-based multi-channel payments services and risk management solutions for demanding businesses.

Electric Imp

Electric Imp

Electric Imp offers an innovative and powerful Internet of Things platform that securely connects devices with advanced cloud computing resources.

CICRA

CICRA

CICRA is Sri Lanka's pioneering cyber security training and consultancy provider.

Build38

Build38

Build38 provides the highest levels of security for mobile applications.

Council to Secure the Digital Economy (CSDE)

Council to Secure the Digital Economy (CSDE)

CSDE brings together companies from across the ICT sector to combat increasingly sophisticated and emerging cyber threats through collaborative actions.

Eclypsium

Eclypsium

Eclypsium protects organizations from the foundation of their computing infrastructure upward, controlling the risk and stopping threats inside firmware of laptops, servers, and networks.

BIND 4.0

BIND 4.0

Bind 4.0 is an acceleration program geared toward tech startups with solutions applied to Advanced Manufacturing, Smart Energy, Health Tech or Food Tech fields.

Trava Security

Trava Security

Trava simplifies cyber risk management for business owners and IT professionals. Automated assessments, mitigation advising, and data-driven cyber insurance.

SightGain

SightGain

SightGain is the only integrated risk management solution focused on cybersecurity readiness using real-world attack simulations in your live environment.

EnigmaSoft

EnigmaSoft

EnigmaSoft is known for its PC anti-malware remediation utility and service under the tradename SpyHunter.

LeadingIT

LeadingIT

Leading IT provides IT support, cloud computing, email support, cybersecurity, networking and firewall services to Chicagoland businesses.

Kyndryl

Kyndryl

Kyndryl has a comprehensive portfolio that leverages hybrid cloud solutions, business resiliency, and network services to help optimize your IT workloads and transformations.

Techstep

Techstep

Techstep is a complete mobile technology enabler, making positive changes to the world of work; freeing people to work more effectively, securely and sustainably.

Filigran

Filigran

Filigran provides threat intelligence, adversary simulation and crisis response open solutions to thousands of cybersecurity and crisis management teams across the world.

Nexsan

Nexsan

Nexsan offers versatile and robust data storage solutions tailored to adapt seamlessly across a diverse range of sectors, ensuring reliable performance for critical data management.

Morrow Global Network

Morrow Global Network

Morrow is the global venture network for venture accelerators, studios, hubs, and their visionary leaders.