NEWS > Cybersecurity News


« Back to News

2016-06-15

Who’s Stealing The Money? SWIFT Tightens Security As A Fourth Bank Is Attacked.

The international bank money transfer system is suffering multiple attacks from a mystery assailant using the same type of code as used to hack Sony.

2016-06-15

Human Error Fuels Most Breaches

Many breaches are caused by methods of working that are known as data breach pitfalls.

2016-06-15

Harvard Business School Wants To Know How To Win At Cybersecurity

HBS graduates now running cybersecurity companies discuss the lessons they have learned and identify some solutions.

2016-06-15

Tor’s Developer Leaves After Lurid Sexual Allegations

Senior Tor developer, Wikileaks hacker and Snowden advocate is forced to resign after rumors of assault emerged online.

2016-06-14

How To Define Cyberwar

What is it that is keeping US Intelligence and Military chiefs awake at night?

2016-06-14

Internet Power: Self Radicalisation & The Orlando Massacre

The Orlando gunman appears to have been motivated to kill by remote propaganda via the internet and social media.

2016-06-14

Now You See It: AI Will Become Invisible

In the near future, artificial intelligence will commonly become intangible, indistinguishable and incomprehensible for humans.

2016-06-14

North Korea’s Psychological Cyberwar Against Its Neighbour

Zombie DDOS attacks, targeted email propaganda and planting fake news videos are all parts of a coordinated campaign against South Korea.

2016-06-13

Connected: The Mobile Police Station

Police in Spain are testing a vehicle equipped with technology that converts a patrol car into a real mobile police station.

2016-06-13

MI5's Uncontrolled Bulk Data Collection

MI5 has escaped regular scrutiny of its bulk collection of communications data, according to newly released confidential correspondence.

2016-06-13

First LinkedIn, Now Twitter ... Hacked User IDs For Sale

Hackers may have used malware to collect more than 32 million Twitter login credentials that are now being sold on the dark web.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManagedMethods

ManagedMethods

ManageMethods Cloud Access Monitor is the only Cloud Access Security Broker (CASB) that can be deployed in minutes, with no special training, and with no impact on users or networks.

SecurePay

SecurePay

SecurePay is Australia's premier payment gateway, with a range of secure online payment solutions for online retailers, SMEs and enterprise businesses.

Ezenta

Ezenta

Ezenta is a Danish IT security consulting firm.

Titanium Industrial Security

Titanium Industrial Security

Titanium Industrial Security specializes in advising and accompanying companies on cybersecurity in Connected Industry (Industry 4.0 / Smart Factory / IIoT).

Wise-Mon

Wise-Mon

Wise-Mon is expert in its field of network monitoring and control. We give solutions to huge organizations with tens of thousands of ports, as well as small companies with one switch.

EU Joint Research Centre

EU Joint Research Centre

JRC is the European Commission's science and knowledge service which employs scientists to carry out research in order to provide independent scientific advice and support to EU policy.

Cloudrise

Cloudrise

Cloudrise are elevating cloud security, data protection, and privacy through assessment, technology enablement, and process automation.

Adlumin

Adlumin

Adlumin Inc. provides the enterprise-grade security operations platform and managed detection and response services that keep mid-market organizations secure.

Portshift

Portshift

Portshift leverages the power of Kubernetes and Service-Mesh to deliver a single source of truth for containers and cloud-native applications security.

Networks Unlimited

Networks Unlimited

Networks Unlimited is a leading value-added distributor in Africa, providing technology solutions with a focus on security, networking, enterprise systems management and cloud technologies.

AnaVation

AnaVation

AnaVation is a trusted partner delivering high-value, cost-effective solutions that solve the most complex technical and analytical problems for our customers.

Cornami

Cornami

Cornami delivers real-time computing on encrypted data sets, which is vital for data privacy and cloud security.

8com

8com

8com is an established Managed Security Service Provider (MSSP) with over 75 employees and customers in over 40 countries.

OneZero Solutions

OneZero Solutions

OneZero specialize in cybersecurity operations, information assurance, computer network operations, solutions engineering, and project management.

ThreatCaptain

ThreatCaptain

ThreatCaptain is a Cybersecurity Leadership Development Company driven to enhance and illuminate cybersecurity risk through strategic alignment and informed business decision-making.

DRT Cyber

DRT Cyber

DRT Cyber deploys technology solutions to support the functions of cybersecurity, privacy, and risk management.