NEWS > Cybersecurity News


« Back to News

2016-04-19

Anonymous’ ‘Hack Israel Day’ Could Impact The Entire World

The operation, which generally consists of DDoS attacks, website defacement and attempts at data theft, has had some positive effects.

2016-04-12

Chinese Military Aim To Lead On Cyber-Space Defense

The Chinese military is forming a new Strategic Force to enhance its cyber warfare, space security & online espionage capabilities.

2016-04-12

Ukraine - More Cyber Attacks

Consultant working for government claims energy companies ignored their own security rules in power grid hack, as more attacks are predicted to come.

2016-04-12

Islamic State Recruits Indian Hackers

Islamic State is recruiting hackers in India to break into government systems and paying them over $10,000 for every job they do.

2016-04-13

Super High-Speed Internet

A startup, Starry, has announced a remarkable plan to bring gigabit-speed Internet access without expensive fiber cables.

2016-04-12

Israeli Drone Hacked By Five Eyes Intelligence

British and American spies collected live video from Israeli drones as part of a classified program code-named “Anarchist” operating from Cyprus.

2016-04-15

Data Analytics Is Driving IT

Data analytics is one of the top areas of IT investments & organisations expect to substantially increase their spending on this in 2016.

2016-04-13

Cyber Crime Forensics

Cybercrime is the fastest growing area of crime in the world. The demand for cyber security professionals is higher than ever.

2016-04-13

Cybersecurity Un-Safe Investments in 2015

Investment in cyber-security companies has been anything but safe in 2015.

2016-04-15

Three Reasons To Revise Your Cyber Security Plans

A cybersecurity strategy that is not up to date with current security tools & research leaves your organizations open to attack.

2016-04-13

People Are (Still) The Biggest Security Risks

Curiosity: It's better to think before you click.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Security Mentor

Security Mentor

Security Mentor provides innovative, online security awareness training designed for how people learn and work.

Glasswall Solutions

Glasswall Solutions

Glasswall Solutions has developed a disruptive, innovative security technology which provides unique protection against document based cyber threats.

Cyberint

Cyberint

Cyberint, the Impactful Intelligence company, fuses open-deep-and darkweb Threat Intelligence with Attack Surface Management to deliver maximum protection from external threats.

EdgeWave

EdgeWave

EdgeWave provides simple but highly effective data security and advanced threat protection in solutions that are affordable, scalable and easy to use.

Cynerio

Cynerio

Cynerio develops cybersecurity protections for medical devices, comparing network behavior with a database of medical workflows.

Bridewell

Bridewell

Bridewell provide cost effective Security & Risk Assurance Services across Information Security, Cyber Security, Technology Risk, Security Testing and Data Privacy.

Maven Technologies

Maven Technologies

Maven Technologies specialize in secure data destruction, electronics recycling, asset management, and highly detailed reporting.

Beryllium InfoSec Collaborative

Beryllium InfoSec Collaborative

Beryllium InfoSec Collaborative is an information security and cyber security company with 40-plus years of experience across industry & government.

Adyta

Adyta

Adyta specializes in cybersecurity solutions adapted to the needs of sovereign institutions, business groups and other organizations that handle information and sensitive or classified data.

Sovereign Intelligence

Sovereign Intelligence

Sovereign Intelligence provides automated insight into the relative intensity of hidden Cyber, Brand, and Financial Risks to your company.

SAIFE

SAIFE

SAIFE has adapted a Software Defined Perimeter approach and paired it with a Zero Trust model that defines access by the user, their device, and where they are located.

Research Institute in Secure Hardware and Embedded Systems (RISE)

Research Institute in Secure Hardware and Embedded Systems (RISE)

The UK Research Institute in Secure Hardware and Embedded Systems (RISE) seeks to identify and address key issues that underpin our understanding of Hardware Security.

Uptycs

Uptycs

Uptycs combines the open source universal agent, osquery, with a scalable security analytics platform for fleet visibility, intrusion detection, vulnerability monitoring and compliance.

Swiss It Security Group

Swiss It Security Group

Swiss It Security Group offers clients complete IT security concepts based on innovative solutions and technology, with a focus on protection, detection and defence.

Tromzo

Tromzo

Tromzo's mission is to eliminate the friction between developers and security so you can scale your application security program.

Ermetic

Ermetic

Ermetic’s identity-first cloud infrastructure security platform provides holistic, multi-cloud protection in an easy-to-deploy SaaS solution.

Encova Insurance

Encova Insurance

Encova’s cyber liability coverage protects you and your customers in case of a security breach in your company's data.

Kompleye

Kompleye

Kompleye is a recognized cybersecurity and compliance audit organization that offer a comprehensive solution for different industries.