NEWS > Cybersecurity News


« Back to News

2015-05-22

German BND Intelligence Cooperation with NSA has Actually Expanded.

German and US intelligence agencies are cooperating on a scale and in ways that are only now becoming apparent.

2015-05-19

Nine Strange Flying Robots from the 2015 Drone Show

The future of drone design is an area with huge importance for companies and for the military. At the recent Unmanned Systems 2015 Show that future was on display.

2015-05-19

US Colleges Open Networks in a Cyberwar

A string of attacks that attempt to exploit weaknesses that are unique to the way colleges operate.

2015-05-22

Countering Cyber Criminals with Biometrics

Biometrics, Smartphones, fingerprint readers; the financial services sector is beginning to to invest in new security measures.

2015-05-20

Predictions for cyber-crime in 2015 and how the Security Industry is Responding

Last year was littered with high-profile cyber threats and security breaches. In 2015, the frequency and severity of cyber-attacks will increase.

2015-05-20

New York Backs Bitcoin but other US States Won’t!

itBit becomes the first Bitcoin exchange to be fully regulated in the United States.

2015-05-20

NSA Snowden is a 'hero' but not in the UK

Edward Snowden and the film on his leaks, Citizenfour, were celebrated at an event in London, but has the UK really got the message on privacy?

2015-05-20

China says Wearable Tech Could Leak Secrets

Wearable tech is now on the growing list of cyberwar battlefields, alongside email inboxes and USB drives.

2015-05-19

"Skynet" is Real and Could Flag You as a Terrorist

Documents leaked by NSA whistleblower Edward Snowden confirm that the Skynet program exists.

2015-05-19

Russia & China Grow Closer With New Cyber Agreement

Russia and China have vowed not to launch cyber attacks against each other, leaving more time to attack other targets.

2015-05-19

Growing number of corporate cyber attacks in Ireland

More than half of Irish companies suffered a security incident last year.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Imperva

Imperva

Imperva is a leading provider of data and application security solutions including DDoS protection, Web application security, Data security and Cloud security.

CIO

CIO

CIO provides technology and business leaders with insight and analysis on information technology trends

Clearwater Security & Compliance

Clearwater Security & Compliance

Clearwater Compliance specialize in Privacy, Security, Compliance and Risk Management Solutions for Health Care, Law Firms and other businesses.

MSAB

MSAB

MSAB is a pioneer in forensic technology for mobile device examination.

VigiTrust

VigiTrust

VigiTrust is a security firm specializing in cloud based eLearning programs, security compliance portals and providing security assessments.

ADL Process

ADL Process

ADL Process offer secure data destruction, certified product destruction and responsible electronics recycling services to businesses and institutions.

Onclave Networks

Onclave Networks

Onclave Networks is a global cybersecurity leader, transforming the future of securing all IT/OT devices and systems.

Cegeka

Cegeka

Cegeka is a family-owned IT company providing end-to-end IT solutions, services & consultancy.

Laminar

Laminar

Laminar provides the only Public Cloud Data Protection solution that provides full visibility and enforcement capabilities across your entire public cloud infrastructure.

Open Quantum Safe (OQS)

Open Quantum Safe (OQS)

The Open Quantum Safe (OQS) project is an open-source project that aims to support the development and prototyping of quantum-resistant cryptography.

NACVIEW

NACVIEW

NACVIEW is a Network Access Control solution. It allows to control endpoints and identities that try to access the network - wired and wireless, including VPN connections.

Techstep

Techstep

Techstep is a complete mobile technology enabler, making positive changes to the world of work; freeing people to work more effectively, securely and sustainably.

Cysurance

Cysurance

Cysurance is a next-generation risk mitigation company that insures, warranties and certifies security solutions.

Framework Security

Framework Security

With Framework Security, you get more than a consultancy; you get a partner dedicated to simplifying cybersecurity and protecting your business in the most efficient way possible.

modePUSH

modePUSH

modePUSH is a cybersecurity company focused on end-to-end breach response from Digital Forensics to Restoration across the enterprise and cloud environments.