NEWS > Cybersecurity News


« Back to News

2016-01-22

2016 Is On The Cusp Of A Machine Revolution

The convergence of technologies across sensors, networks, artificial intelligence and robotics is making amazing things possible.

2016-01-20

UK Police Deploy Drone-Jamming Technology at Major Public Events

British police are planning to use sophisticated unmanned aerial vehicle (UAV) detection & jamming technology to detect terrorist threats.

2016-01-22

2016 Cyber Threat - Use To Advantage

Here are seven predictions for threat activity in 2016 from Security Week.

2016-01-20

Commercial Opportunities To Be Found In Security Problems

It's not only a vital defensive measure. There's money to be made from securing company data.

2016-01-20

Fighting Cybercrime Can Be Turned Into A Commercial Opportunity

Companies can use security initiatives to improve their customers’ experience and drive greater sales.

2016-01-19

Mentoring Startups: Technology Solving Education Problems

One to One: Startups are using online mentorship to combine the strengths of technology with the unique value of human beings.

2016-01-20

Hefty Fine Over False Encryption Claims

Dental software company pays a penalty for misleading customers on the level of encryption it provided to protect sensitive patient data.

2016-01-20

Anonymous Want Revenge For Saudi Executions

Hackers have targeted Saudi Arabia's Ministry of Defence website with a sustained DDoS attack.

2016-01-21

Russian Hackers Warn EU Trains Are Vulnerable to Hijack

Russian hackers have exposed gaping holes in computer systems that control train networks across Europe.

2016-01-19

Amazon’s Data Centers Are Located in US Spy Country

There's a reason Amazon Web Services are located close to US intelligence infrastructure.

2016-01-20

EU General Data Protection: A Milestone Of The Digital Age

The recently agreed-upon EU General Data Protection Regulation (GDPR) might be the most important piece of legislation in the history of the EU.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Riverbed Technology

Riverbed Technology

The Riverbed Network and Application Performance Platform enables organizations to visualize, optimize, accelerate and remediate the performance of any network for any application.

CircleCI

CircleCI

CircleCI’s platform allows developers to rapidly release code (for web and mobile apps) they trust by automating the build, test, and deploy process.

Performanta

Performanta

Performanta offer a consultative approach to people, process and technology, focusing on security projects in line with adversarial, accidental and environmental business risk.

CyberDefcon

CyberDefcon

CyberDefcon is an independent organization dedicated to the pursuit of making the internet a safer place.

Greenbone Networks

Greenbone Networks

Greenbone Networks delivers a vulnerability analysis solution for enterprise IT which includes reporting and security change management.

Onspring

Onspring

Onspring is the cloud-based platform of choice for governance, risk and compliance (GRC) teams and business operations experts across multiple industries.

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute at Northern Michigan University offers non-degree and industry credentials relevant to emerging careers in cybersecurity.

BullGuard

BullGuard

BullGuard is an award-winning cybersecurity company focused on providing the consumer and small business markets with the confidence to use the internet in absolute safety.

AlertSec

AlertSec

AlertSec Ensure is a U.S. patented technology that allows you to educate, verify and enforce encryption compliance of third-party devices.

AutoRABIT

AutoRABIT

AutoRABIT provides DevSecOps tools built specifically for Salesforce developers to increase release velocity, produce consistently high-quality code, and enhance data security.

Mission Critical Partners (MCP)

Mission Critical Partners (MCP)

Mission Critical Partners is committed to delivering innovative solutions that help our clients enhance and evolve their critical-communications systems and operations.

Accops Systems

Accops Systems

Accops enables secure and instant remote access to business applications from any device and network, ensuring compliant enterprise mobility.

Halogen Group

Halogen Group

Halogen Group is the leading Security Solutions Provider in West Africa. Services encompass Physical Security, Electronic Security, Virtual & Cyber Security, Risk Assessments and Training.

Hush

Hush

Hush is a premium privacy service that gives people unprecedented visibility and control of their digital footprint. Hush assesses threats, and goes to work to eliminate digital risks on your behalf.

EPAM Systems

EPAM Systems

Since 1993, EPAM Systems has leveraged its advanced software engineering heritage to become a leading global digital transformation services provider.

ArmorX AI

ArmorX AI

ArmorX AI (formerly Kapalya) operates an encryption management platform designed to encrypt all data in transit and at rest on mobile end-points, corporate servers, and cloud servers.