NEWS > Cybersecurity News


« Back to News

2016-01-02

Criminals Identify Deceased ID as Easy Target

A survey of ex-offenders found strong evidence that criminals are turning towards data-driven crimes over other options.

2016-01-02

Industrial Control Systems Vulnerable

According to ICS-CERT some advanced networks are vulnerable to remote attackers looking to intercept communications to and from devices.

2015-12-30

Getting Workers To 'buy-in' To Cybersecurity

Organizations should make sure their workers understand the importance of cyber security and actively take part in defending their company.

2015-12-29

US Banks Get Tough On Cybersecurity In 2016

National requirements for US banks to include multi-factor authorisation, audits, pen-tests, & exacting third-party vendor cybersecurity scrutiny.

2015-12-28

Intelligence Agencies Should Recruit Like Google

Finding good intelligence hires is difficult. Pehaps intelligence agencies should be using more unconventional methods.

2015-12-24

The Secure Perimeter Cybersecurity Model Is Broken

The system is broken. It isn’t keeping us, companies, or our government safe. Worse yet, no one seems to know how to fix it.

2015-12-23

Could IS Create A Cyber War?

Critical industries need to significantly ramp up their cyber security or risk having Islamic State hackers attack.

2015-12-22

Understanding the Threat Intelligence Lifecycle

The Two Step Program: What is Threat Intelligence and why does in matter?

2015-12-17

Mystery: US State Dept. Can't Find Missing Clinton Emails

The US Department of State has lost Hillary Clinton's emails and pleads the 5th Amendment. Maybe the FBI have got them?

2015-12-15

British Universities Suffer Sustained Cyber Assault

University students & faculty across the UK have been affected after the academic computer network known as Janet came under attack.

2015-12-15

ISIS Counter-Attack Anonymous

Doxing: Islamic State are hitting back at Anonymous hacktivists

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Nixon Peabody LLP

Nixon Peabody LLP

Nixon Peabody LLP is an international law firm with offices across the USA, Europe and Asia. Practice areas include Data Privacy and Cyber Security.

Intrinsic-ID

Intrinsic-ID

Intrinsic-ID's authentication technology creates unique IDs and keys to authenticate chips, data, devices and systems.

Trustwave

Trustwave

Trustwave is a leader in managed detection and response (MDR), managed security services (MSS), consulting and professional services, database security, and email security.

Wavestone

Wavestone

Wavestone is a strategy and technology consulting company with areas of expertise including digital transformation and cybersecurity.

CyberPoint

CyberPoint

CyberPoint delivers innovative, leading-edge cyber security products, solutions, and services to customers worldwide.

Synack

Synack

Synack provides a hacker-powered intelligence platform that uncovers security vulnerabilities that often remain undetected by traditional pen testers and scanners.

MaskTech

MaskTech

MaskTech supplies highest security embedded chipsets, operating systems and related middleware for electronic identification cards, travel documents and authentication solutions.

Secure Soft

Secure Soft

Secure Soft are experts in Computer and Information Security with a presence in Peru, Colombia and Ecuador.

Aergo

Aergo

Aergo offers an easier and more proven way to adopt blockchain and transform your business while building on your existing IT and cloud assets.

Cybersec Infohub

Cybersec Infohub

Cybersec Infohub is a Hong Kong government programme to enhance the exchange of cyber security information with industry and enterprises to jointly defend against cyber attacks.

BlackCloak

BlackCloak

BlackCloak provides Concierge Cyber Security for high-net-worth individuals and corporate executives to protect them from cybercrime, reputational risks, hacking and identity theft.

ProWriters

ProWriters

As a leading cyber insurance company, ProWriters offers flexible Cyber Liability Insurance coverage designed to cover privacy, data, and network exposures.

GeoEdge

GeoEdge

GeoEdge is the premier provider of ad security and quality solutions for the online and mobile advertising ecosystem.

Xceptional

Xceptional

Xceptional is a multi-award-winning technology services firm that celebrates the unique strengths of people with autism.

VicOne

VicOne

With a vision to secure the vehicles of tomorrow, VicOne delivers a broad portfolio of cybersecurity software and services for the automotive industry.

Forensic IT

Forensic IT

Forensic IT is a specialised cyber security firm with expertise in Digital Forensics and Incident Response (DFIR).