NEWS > Cybersecurity News


« Back to News

2016-02-26

Ex - CIA Spy Confirms That The US And Russia Are At Cyber War

Surprise: The US has engaged in "offensive cyber operations" against Russia.

2016-02-23

Israeli Cybertech Startups Set Trends

Cybertech 2016 in Tel Aviv showcased Israel's cybertech startups trying to make it big in the country's saturated tech startup ecosystem.

2016-02-26

Drones Could Fabricate Buildings Using 3D Printing

Swarms of unmanned aerial vehicles (UAV) will be able to print emergency shelters for survivors of natural disasters, buildings & large structures.

2016-02-24

All The Gadgets Coming To Your Next Car

The latest and greatest in new automotive gadgets include a sports car with it's own drone.

2016-02-24

The Big Three: N. Korea, ISIS and CyberWar

U.S. Director of National Intelligence James Clapper identifies three major threats to US security in 2016.

2016-02-24

The Sony Hackers Are Alive And Still Hacking

N. Korea? Vengeful ex- employees? Cyber criminals? One thing we know - they can't spell.

2016-02-24

AI Could Leave Half Of The World Unemployed

AI’s economic threat should not be understated. Machines could put half the world’s population out of a job in the next 30 years.

2016-02-23

Energy Utilities Highly Vulnerable To Cyber Attacks

IT professionals in the Energy & Utilities sectors are not not optimistic their organisations can detect & protect against damaging cyber attacks.

2016-02-23

Strategic Intelligence For The 21st Century.

Terrorism today is a widening series of global alliances assisted by social media and electronic propaganda. Opinion by Alfred Rolington

2016-02-23

FBI's War On Encryption Is Unnecessary

The data trails we voluntarily leave allow IOT devices and social media networks to track us in ways the government can easily access.

2016-02-23

Why Aren’t Cyber Criminals Being Brought to Justice?

Cyber criminals are making off with $400 to $500 billion each year; why exactly are attackers getting away without being brought to justice?

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Nutanix

Nutanix

The Nutanix enterprise cloud platform provides performance, robust security, and seamless application mobility for a broad range of enterprise applications.

Menlo Security

Menlo Security

Menlo Security protects organizations from cyberattacks by eliminating the threat of malware from the web, documents, and email.

Uniscon

Uniscon

Uniscon is a leading provider of cloud security solutions in Europe.

EdgeWave

EdgeWave

EdgeWave provides simple but highly effective data security and advanced threat protection in solutions that are affordable, scalable and easy to use.

The Data Privacy Group

The Data Privacy Group

The Data Privacy Group provide expert professional services underpinned by world leading automation tools and a consulting team specialized in privacy and data protection.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

SAIFE

SAIFE

SAIFE has adapted a Software Defined Perimeter approach and paired it with a Zero Trust model that defines access by the user, their device, and where they are located.

Digitpol

Digitpol

Digitpol’s Cyber Crime Investigation experts investigate hacking incidents, ransomware, extortion and conduct security audits and IT upgrades.

GeoEdge

GeoEdge

GeoEdge is the premier provider of ad security and quality solutions for the online and mobile advertising ecosystem.

Zeva

Zeva

Zeva solves complex identity and encryption challenges for the federal government and corporations around the globe.

watchTowr

watchTowr

Continuous Attack Surface Testing, with the watchTowr Platform. The future of Attack Surface Management.

Technivorus Technology

Technivorus Technology

Technivorus is a deep-tech firm delivering customized Cybersecurity, Digital Marketing, Web & App Development, and multifarious IT services for businesses across the globe.

Cisco Systems

Cisco Systems

Cisco helps seize the opportunities of tomorrow by proving that amazing things can happen when you connect the unconnected.

WillJam Ventures

WillJam Ventures

WillJam Ventures are a private equity firm focused on investing in world-class cybersecurity companies that will become the next generation of leaders in protecting the world’s digital assets.

USX Cyber

USX Cyber

USX Cyber was founded on the idea that small and medium businesses deserve and require the same level and sophistication of cyber protection as large enterprises.

Quotient

Quotient

Quotient builds digital experiences that empower and inspire the American people by understanding their needs, simplifying complex technical solutions and adapting to how they work, live and learn.