NEWS > Cybersecurity News


« Back to News

2015-08-25

Japan: Court Rules Against Bitcoin Compensation

Tokyo District Court rules that the virtual currency Bitcoin is "not subject to ownership".

2015-08-25

Legal Issues Of Cyber War Are Big & Complex

What does it it take to trigger self-defense in cyberspace, and what does it mean for a nation-state to have 'effective control' of a hacker?

2015-08-25

Bitdefender Suffers Data Breach, Customer Records Stolen

Bitdefender has become the latest cybersecurity firm to be targeted by hackers.

2015-08-25

Cyber Attacks on the Power Grid

The protection of critical infrastructure like a power grid is an essential part of the cyber strategy of any Government.

2015-08-25

Addressing the Predictive Analytics Skills Gap

Organizations must pay attention to a variety of skills & how to combine them with technology to ensure success in using predictive analytics.

2015-08-24

How Uber Could Help Change Spycraft

Social media is an indicator of developments that the intelligence apparatus would never previously have had access to.

2015-08-24

Investors Pour $Billions in to Cybersecurity

Venture capital firms & corporate investors have put a record amount of money in to cybersecurity companies over the past year.

2015-08-24

Defusing The Internet Of Things Time Bomb

The IoT offerings present a unique challenge because of the balance between functionality and connectivity.

2015-08-24

Ad Block Software 'Costs Firms £14bn A Year'

The economic impact of ad blocking is real and measurable

2015-08-21

Fraudsters Steal $46.7m From Ubiquiti Networks

Business E-mail Compromise (BEC) scam: The incident involved employee impersonation and fraudulent requests from an outside entity.

2015-08-21

When Your White Hat Is Really a Black Hat

Can you really trust all the people working for your company (or hired contractors) to protect sensitive data?

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ACME Communications

ACME Communications

ACME Communications specialises in the field of data centre, implementation, maintenance & operation and all aspects of other IT service.

Yubico

Yubico

Yubico sets new global standards for simple and secure access to computers, mobile devices, servers, and internet accounts.

MailGuard

MailGuard

MailGuard delivers a full suite of security solutions across email and web to protect your business before threats reach your environment.

SafeBreach

SafeBreach

SafeBreach's platform simulates hacker breach methods across the entire kill chain to identify breach scenarios in your environment before an attacker does.

Kivu Consulting

Kivu Consulting

Kivu Consulting combines technical and legal expertise to deliver data breach response, investigative, discovery and forensic solutions worldwide.

Secudos

Secudos

SECUDOS is an innovative appliance technology and services provider focused on IT security and compliance.

Build38

Build38

Build38 provides the highest levels of security for mobile applications.

Lifespan Technology

Lifespan Technology

Lifespan Technology provides the full range of IT Asset Disposition services. This includes hardware recycling and disposal, data destruction, and hardware resale.

Evanston Technology Partners (ETP)

Evanston Technology Partners (ETP)

ETP provides services and solutions to enable and transform businesses in the areas of cybersecurity, data protection, and efficient operations practices.

Jandnet Recruitment

Jandnet Recruitment

Jandnet Recruitment is a small specialist company working in the IT sector. We recruit across all IT disciplines including cyber security and digital identity.

WolfSSL

WolfSSL

wolfSSL is an embedded SSL/TLS library providing secure communication for IoT, smart grid, connected home, routers, applications, games, phones, and more.

Gray Analytics

Gray Analytics

Gray Analytics is a Cybersecurity Risk Management company providing best-practice services across a broad spectrum of cyber scenarios for both government and commercial customers.

DartPoints

DartPoints

DartPoints helps bridge the digital divide by delivering cloud, colocation, managed services + edge infrastructure.

CryptoDATA

CryptoDATA

CryptoDATA develops products and services based on Blockchain technology, that ensure user security and data encryption, applicable in various fields.

Nclose

Nclose

Nclose is a proudly South African cyber security specialist that has been securing leading enterprises and building our security portfolio since 2006.

Vault Cloud

Vault Cloud

Vault Cloud, Australia's National Cloud, is an Australian owned and operated company specialising in secure, sovereign, hyperscale cloud infrastructure.