NEWS > Cybersecurity News


« Back to News

2015-06-16

PWC 2015 Information Security Breaches Survey

PWC survey aims to provide greater awareness amongst UK business on how companies are (not) mitigating cyber risks.

2015-06-16

GCHQ Lack Staff for 'umbrella' Cyber Surveillance

Do GCHQ have enough skilled people to carry out effective mass surveillance?

2015-06-16

Snowden Revelations Costly for US Tech Firms

US cloud computing firms could lose between $22 billion and $35 billion in overseas business.

2015-06-16

Russia Hacked The German Parliament

The German government says the hack of the Bundestag came from Russia in a state-sponsored attack.

2015-06-16

GCHQ uses Cyber Techniques Outlawed in US

GCHQ collects “bulk personal datasets” from millions of phone & internet records using techniques now banned in the US.

2015-06-16

‘Don’t Risk IT – Cyber Secure IT’

The 2015 ISBS Survey reveals that 90% of large organisations reported suffering a security breach, up from 81% in 2014.

2015-06-16

Seven Critical Criteria for Cloud Data Encryption

Encrypting the huge number of data files stored in a public cloud is like bubble-wrapping a house.

2015-06-16

Dark Web Drug Dealers Specialised in ‘party packs’

Convicted: Two drug traffickers, who ran a drug ‘party pack’ used the ‘Silk Road’ to move illegal drugs.

2015-06-15

Instilling a Culture of Cyber Security

Companies selling cyber security say their tools will “defend” & “protect”. The reality is technology creates a false sense of security.

2015-06-15

UK Web Snooping Powers Are 'Undemocratic'

A review UK of phone & Internet surveillance says current "undemocratic and unnecessary" laws need a complete overhaul.

2015-06-15

The Bright Horizon For Information Security Jobs

At least one group of graduates is poised to take advantage of a massive skills shortage: cybersecurity professionals.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

exceet Secure Solutions

exceet Secure Solutions

exceet Secure Solutions is your experienced specialist for Internet of Things (IoT), Heath Telematics, electronic signatures and timestamps and IT security.

AKS IT Services

AKS IT Services

AKS IT Services (an ISO 9001:2015 and ISO 27001:2013 certified company) is a leading IT Security Services and Solutions provider.

Cybersecurity Defense Initiative (CDI) - University of Arkansas

Cybersecurity Defense Initiative (CDI) - University of Arkansas

The Cybersecurity Defense Initiative is a national cybersecurity training program, developed for technical personnel and managers who monitor and protect our nation's critical cyber infrastructures.

Dice

Dice

Dice is a leading recruitment platform, helping technology professionals manage their careers and employers connect with highly skilled tech talent in specialist areas including cybersecurity.

Wynyard Group

Wynyard Group

Wynyard Group is a niche, technology-driven company specializing in Integrated Border Security solutions for enhanced public safety.

iosiro

iosiro

iosiro was created to guide companies through securely using blockchain technologies. We help teams launch and manage ICOs, deploy secure dApps, and integrate private networks into business practices.

Get Indemnity

Get Indemnity

Get Indemnity are specialist insurance brokers with experience working on a wide range of innovative business insurance products that combine risk management, indemnity and incident response services.

Vulcan Cyber

Vulcan Cyber

At Vulcan, we’re modernizing the way enterprises reduce their cyber risk. From detection to resolution, we automate and orchestrate the vulnerability remediation process dynamically and at scale.

Iron Bow Technologies

Iron Bow Technologies

Iron Bow Technologies is a leading IT solution provider dedicated to successfully transforming technology investments into business capabilities for government, commercial and healthcare clients.

Aristi Technologies

Aristi Technologies

Aristi provides cybersecurity risk and compliance services to help manage your unique cyber risks, safeguarding your systems and data and complying with government and industry standards.

Infiot

Infiot

Infiot is a pioneer in enabling secure, reliable access with zero trust security, network optimization, edge-intelligence and AI driven operations for all remote users, devices, sites and cloud.

HiddenLayer

HiddenLayer

HiddenLayer is a provider of security solutions for machine learning algorithms, models and the data that power them.

Information Systems Security Association (ISSA)

Information Systems Security Association (ISSA)

ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

Protecto

Protecto

Make privacy and governance effortless. Brakes allow you to drive faster. Stronger data privacy and security enable companies to unlock the full potential of the data.

Sansec Technology

Sansec Technology

Sansec Technology is dedicated to the research and development of cryptographic products and solutions for cyber security.

Neeve

Neeve

Neeve is an edge cloud platform transforming smart buildings and spaces, making them more secure, smarter, and more sustainable.