NEWS > Cybersecurity News


« Back to News

2016-03-01

Predictive Analytics For Web Content

Using analytics to measure how your content is received by your intended audience should be a priority, but the data must be actionable to be useful.

2016-03-01

Cybercrime: Is the Sky Really Falling?

Cybercrime is so rampant today that no-one is immune. Not even the chief examiner for Digital Forensics Inc, Daniel Libby.

2016-03-01

One-Third Of IT Staff Are Hackers

About a third of IT staff have hacked an organization, sometimes the one they work for.

2016-03-01

Belgian Government Plagued By Hackers

Latest Incident: Hackers claim to have made a successful DDoS attack on the Belgian National Bank, shutting down the bank’s website.

2016-03-01

Inside The FBI's Encryption Battle With Apple

The FBI searched for a compelling case that would force Apple to weaken iPhone security – and then the San Bernardino shooting happened.

2016-03-01

Forget Trident & Welcome To Cyber Warfare

Forget debates about Britain’s nuclear deterrent. New technology means a country can be brought to its knees with the click of a mouse.

2016-02-24

Executive Education: Brown University’s Master In Cybersecurity

Cybersecurity professionals feel they lack the necessary skills and resources to keep up with the ever increasing demands for cybersecurity.

2016-02-24

Cyber Risk Insurance Is A Patchwork

Use of cyber-specific wording and products may be an effective way of filling gaps of cover which exist in conventional lines of insurance.

2016-02-24

Israel Is 15 Years Ahead in Cyber Warfare

Confronting the range of rapidly evolving cyber warfare challenges has transformed the Israeli military.

2016-02-26

Cybersecurity To Go On The Offensive

Organizations with a sophisticated approach to cybersecurity are no longer satisfied with locking the doors after the robbery has been committed.

2016-02-24

Know Your Enemy: The Most Popular Hacking Methods

The Easy Way: Outsiders want to become insiders with the least possible effort, and insiders help them do so - mostly accidentally.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Duane Morris LLP

Duane Morris LLP

Duane Morris is a global law firm with offices in the USA, UK and Asia. Practice areas include Cybersecurity.

Thermo Systems

Thermo Systems

Thermo Systems is a design-build control systems engineering and construction firm. Capabilties include industrial control system cybersecurity.

Caretower

Caretower

Caretower is one of Europe’s leading value added managed service provider in cyber security.

Galvanize

Galvanize

Galvanize is a leading provider of award-winning, cloud-based security, risk management, compliance, and audit software for some of the world’s largest organizations.

SecureKey Technologies

SecureKey Technologies

SecureKey is a leading identity and authentication provider that simplifies consumer access to online services and applications.

Cyversity

Cyversity

Cyversity's mission (formerly ICMCP) is the consistent representation of women and underrepresented minorities in the cybersecurity industry.

G DATA CyberDefense

G DATA CyberDefense

G Data developed the world's first antivirus software. We now ensure the security of small, large and medium-sized companies all over the world.

MagiQ Technologies

MagiQ Technologies

MagiQ produced the world’s first commercial quantum cryptography product that delivered advanced, future-proof network security.

eXate

eXate

eXate provides pioneering technology that empowers organisations to protect, control and manage their sensitive data centrally, providing a complete data privacy solution.

SecurityGate

SecurityGate

SecurityGate.io is the only Integrated Risk Management platform built for OT/ICS cybersecurity. The leading Risk Assessment Platform for Critical Infrastructure.

ID R&D

ID R&D

ID R&D is an award-winning provider of AI-based facial liveness, document liveness, and voice biometrics.

Cyber Security Council UAE

Cyber Security Council UAE

The Cyber Security Council's vision is to protect UAE cyberspace, maintain confidence in our digital infrastructure and institutions, and build a cyber-resilient society.

Calamu

Calamu

Calamu is a software-defined storage security and resiliency platform that keeps your data secure and accessible wherever you choose to store it.

Ingenics Digital

Ingenics Digital

Ingenics Digital is a recognized initiator and leading service provider in the areas of software development and embedded systems.

Seal Security

Seal Security

Seal Security revolutionizes software supply chain security operations, empowering organizations to automate and scale their open source vulnerability remediation and patch management.

Phone Monitoring Service

Phone Monitoring Service

Phone Monitoring Service provides cyber security services, ethical hacking services, social media hacking services in the USA, Canada, Europe.