NEWS > Cybersecurity News


« Back to News

2016-04-06

Biggest Data Leak Ever Exposes World's Most Rich & Powerful

An obscure law firm in Central America is the source of what's being called the largest information leak in history.

2016-04-11

27% Of Known Malware First Appeared In 2015

PandaLabs, the R&D laboratory of Panda Security, both detected and neutralized more than 84 million new malware samples throughout 2015.

2016-04-06

UK Surveillance Powers Bill Could Force Startups To Build In Backdoors

The UK's proposed new surveillance law enables state agencies to compel even very small startups to build backdoors into their systems.

2016-04-11

CIOs Fear Fines From New EU Data Laws

CIOs are concerned their current security policies put them at risk of serious fines under new European data protection laws.

2016-04-11

Is Breach Notification Part Of Your Response Plan?

Is customer-facing breach notification and response a part of your incident response plan? It should be!

2016-04-07

Typo Thwarts Hackers In $1B Cyber Heist

It was just a few letters off: Someone misspelled “foundation” as “fandation” on an online payment transfer request for $1 billion .

2016-04-08

Cybersecurity Budgets Rise But Not In Line With Threats

The Institute of Information Security Professionals (IISP) has announced the findings from its 2016 member survey.

2016-04-08

BYOD Security Report

Crowd Research Partners' new report provides a conflicting picture of current BYOD security barriers and adoption trends in the workplace.

2016-04-06

The Top 4 IT Risks For Small Businesses

Most small businesses assume that the bigger enterprises are more under cyber threat. This assumption is not right.

2016-04-08

CISO Cyber Communications Breakdown

CISOs and the board of directors are missing the mark when it comes to cybersecurity reporting.

2016-04-05

Russian Cyber War Training Can Be A Killer

Russia is developing and testing military grade Cyber War weapons on real targets, and finding out what works and what needs improvement.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Octopus Cybercrime Community

Octopus Cybercrime Community

The Octopus Community is a platform for information sharing and cooperation on cybercrime and electronic evidence.

CERT Syria

CERT Syria

CERT Syria is the national Computer Emergency Response Team for Syria.

IDpendant

IDpendant

IDpendant offers a wide range of services, including authentication technology, client security products, single sign on systems, encryption solutions, card and mobile device management systems.

Blue Lights Digital

Blue Lights Digital

Blue Lights Digital have developed a range of platforms to support digital investigations, as well as providing continued support and education for investigations professionals.

Trulioo

Trulioo

Trulioo is a leading global identity and business verification company providing secure access to data sources worldwide to instantly verify consumers and businesses online.

Modux

Modux

Modux focus on a number of core competencies across cyber security including; cyber intelligence & analytics, penetration testing and training.

FTAPI Software

FTAPI Software

FTAPI SecuTransfer is a software solution for end-to-end encrypted data exchange of large and sensitive data with customers and partners.

Naukrigulf

Naukrigulf

Naukrigulf.com is one of the fastest growing job sites in the Gulf, with thousands of registered job seekers and a robust CV database across many sectors, including cybersecurity.

Sequretek

Sequretek

Sequretek was formed with the aim to “Simplify Security”. We envision a future where enterprise networks are streamlined, secure and simple.

Tangible Security

Tangible Security

Tangible employs the most sophisticated cyber security tools and techniques available to protect our clients’ sensitive data, infrastructure and competitive advantage.

RealCISO

RealCISO

RealCISO is a CISO grade cloud platform to help companies understand, manage, and mitigate their cyber risk.

Digital Beachhead

Digital Beachhead

Digital Beachhead has the expertise to provide a range of Cyber Risk Management and other Professional Services with specifically tailored solutions at competitive prices.

Coralogix

Coralogix

Coralogix are rebuilding the path to observability using a real-time streaming analytics pipeline that provides monitoring, visualization, and alerting capabilities without the burden of indexing.

RiskSmart

RiskSmart

RiskSmart empower risk, compliance, and legal teams with a tech-led and data-driven platform designed to save time, reduce costs and add real value to businesses.

Dimension Data

Dimension Data

Dimension Data is a leading African born technology provider operating in the Middle East and Africa, offering a portfolio of services including intelligent security solutions.

ZEUSS

ZEUSS

ZEUSS is a diversified data center, cybersecurity, and green energy company.