NEWS > Cybersecurity News


« Back to News

2016-02-11

3D Printing Transitions To 4D

3D printing is in itself a new technology and now researchers are taking it a step further by adding another dimension – time.

2016-02-10

What Is Human In The Age of Technology?

The evolutionary pressures surrounding machines are every bit as intense as in nature, and with few of its constraints.

2016-02-09

Active Cyber Defense Task Force

The US Center for Cyber and Homeland Security has launched a new project about active defense by the private sector against cyber threats.

2016-02-05

Who Needs A Computer Science Degree Anyway?

While they can’t necessarily replace a college degree, MOOCs are playing a key role in addressing the software development skills gap.

2016-02-12

EU Protects Online Data Quite Differently From The US

What control do you have over how companies collect & use your information? Different approaches in the US & EU have consequences.

2016-02-10

TalkTalk's Cybersecurity Lesson

TalkTalk has been hacked three times in the past year. Companies must invest wisely to properly protect their customers & their reputations.

2016-02-09

Self-Driving Car Poses High Hacking Risk

Big car companies are soon to introduce self-driving technology, threatening to open a whole new range of security problems

2016-02-10

How to Recover From The Hack Nightmare

It’s more than just the PR department’s “problem.” IT executives need to be involved in managing the fallout and crafting responses.

2016-02-09

HSBC Bank In The Line Of Cyber Fire

HSBC says its UK online banking operation is being affected for the second time this year by a cyber attack that started in January.

2016-02-10

Protecting The Crown Jewels Of Corporate Data

Knowing that an organization will suffer a breach sooner or later, IT security professionals must first protect the company's most important data.

2016-02-09

Intelligence Agencies Want To Target Surveillance Programs

IoT devices and cloud-based services represent the next frontier for digital surveillance, claims a new report from Harvard's Berkman Center.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cyren

Cyren

Cyren is a cloud-based, Internet security technology company providing threat detection and security analytics.

Lookout

Lookout

Lookout is the data-centric cloud security company that uses a defense-in-depth strategy to address the different stages of a modern cybersecurity attack.

EuroISPA

EuroISPA

EuroISPA is a pan European association of European Internet Services Providers Associations and the world’s largest association of ISPs.

Trust in Digital Life (TDL)

Trust in Digital Life (TDL)

TDL is a membership association comprising companies, SMEs, universities and research institutes who exchange experience and insights to make digital services in Europe trustworthy and safe.

File Centre

File Centre

File Centre is a leading specialist when it comes to data backup, we offer our clients a premium backup retrieval and delivery solution.

Red Canary

Red Canary

Red Canary continuously monitors and analyzes your endpoints, users, and network activity in search of threatening behaviors, patterns, and signatures.

Sandia National Laboratories

Sandia National Laboratories

Sandia National Laboratories is a premier science and engineering lab for national security and technology innovation.

Clym

Clym

Clym is the data privacy platform that helps organisations meet their data protection obligations. Cookies, Consent, Requests, Policies and more are all managed in a secure and adaptive application.

Quest Software

Quest Software

Simple IT management for a complex world. Whether it’s digital transformation, cloud expansion, security threats or something new, Quest helps you solve complex problems with simple solutions.

Secure IT Disposals

Secure IT Disposals

Secure IT Disposals specialise in professional Computer Recycling, Computer Disposals, Computer Destruction, Data Erasure and end-of-lifecycle solutions.

YesWeHack

YesWeHack

YesWeHack offers companies an innovative approach to cybersecurity with Bug Bounty (pay-per-vulnerability discovered) to identify and report vulnerabilities in their systems.

Pelion IoT

Pelion IoT

Pelion Connected Device Services are the easiest way to securely connect and manage your devices, allowing you to focus on forging your future.

Creative ITC

Creative ITC

Creative ITC is a leading infrastructure and cloud enablement company. We design and deliver exceptional managed services and cloud solutions.

Telesystem

Telesystem

Telesystem empowers businesses across the USA with a range of innovative network, communication and collaboration solutions.

Siren

Siren

Siren provides the leading Investigative Intelligence Platform to some of the world’s leading Law Enforcement, National Security and Cyber threat investigators.

Prismo Systems

Prismo Systems

Prismo provides a unified platform to secure software development across the entire SDLC and deployment on any cloud or on-premises infrastructure.