NEWS > Cybersecurity News


« Back to News

2015-04-22

NSA’s Plan to Snowden-Proof Data Using the Cloud

With NSA’s widespread adoption of cloud-based computing, the spy agency has made a big technology bet.

2015-04-22

The Internet Connected Car

By 2020 BI Intelligence estimates that 75% of cars shipped globally will be connected.

2015-04-21

Planes Without Pilots

The Centaur Optionally Piloted Aircraft can be operated unmanned or with pilots on board.

2015-04-22

Wi-Fi on Planes is Vulnerable to Inflight Hacking

Hackers on commercial flights could now bring down the plane they are on by using the on board Wi-Fi.

2015-04-17

Cloud-based Business Intelligence Goes Mainstream

More than 50 percent of businesses currently use or plan to use cloud-based business intelligence.

2015-04-17

Cybercrime More Profitable Than Drug Trading

Total Global Impact of Cybercrime is US$3 Trillion, making it more profitable than the global trade in marijuana, cocaine & heroin combined.

2015-04-16

Insurance Experts Say Adequate Cyber Cover Is Now Available.

Cyber insurance is becoming broader and more affordable, although it's worth shopping around for the right policy.

2015-04-14

French Media’s Emergency Meeting After Isis Hack

Crisis: All TV5Monde broadcasts were brought down in a blackout by hackers claiming allegiance to Isis.

2015-04-15

Snowden’s HBO Interview: Has He Actually Read The NSA Documents He Leaked?

Snowden tells HBO that he hadn’t thoroughly looked at the sensitive documents before leaking them, knowing they were “harmful”.

2015-04-08

US: Comcast Ultra-fast Internet by 2016

Internet speeds of up to 2 gigabits per second to the majority of its nearly 22 million subscribers.

2015-04-08

Are You Really Spending Enough on Security?

Many CIOs endanger their companies simply by not spending enough on security.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

softScheck

softScheck

softScheck is an IT security consultancy. Services range from pentesting and compliance testing to security auditing of software and IT infrastructure.

Sentropi

Sentropi

Sentropi is an online protection solution against charge backs, account takeovers, identity thefts and online scams.

Turkish Accreditation Agency (TURKAK)

Turkish Accreditation Agency (TURKAK)

TURKAK is the national accreditation body for Turkey. The directory of members provides details of organisations offering certification services for ISO 27001.

Method Cyber Security

Method Cyber Security

Method offers a Cyber Security Risk Management training course for those responsible for the security of industrial automation, control and safety systems.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

CryptoSec.info

CryptoSec.info

CryptoSec.info is a web resource focused on educating the beginners in the cryptocurrency space on how to properly secure their online assets from hackers and scammers.

T-REX

T-REX

T-REX is a coworking space, technology incubator, and entrepreneur resource center for technology startups.

CyberSec Hub

CyberSec Hub

The goal of CyberSec Hub is to create a centre of excellence for cybersecurity in Krakow, a new European “Cyber-Silicon Valley”.

Atakama

Atakama

With Atakama, data remains encrypted until the very moment it is used, and the ability to decrypt is based on zero trust architecture.

Softcat

Softcat

Softcat offer a broad portfolio of IT services and solutions covering Hybrid Infrastructure, Cyber Security, Digital Workspace and IT Intelligence.

Stratia Cyber

Stratia Cyber

Stratia Cyber is an independent, technology agnostic company providing high quality, pragmatic cyber security consultancy and expertise.

SECUINFRA

SECUINFRA

Since 2010, SECUINFRA have specialized in detecting, analyzing and defending against cyber attacks.

Mission Critical Partners (MCP)

Mission Critical Partners (MCP)

Mission Critical Partners is committed to delivering innovative solutions that help our clients enhance and evolve their critical-communications systems and operations.

SilverEdge Government Solutions

SilverEdge Government Solutions

SilverEdge is a next generation provider of innovative and proprietary cybersecurity, software, and intelligence solutions for the Defense and Intelligence Communities.

Data Computer Services

Data Computer Services

Data Computer Services provides professional tailored IT Support and IT Services for businesses throughout Edinburgh and the Lothians.

ACDS (Advanced Cyber Defence Systems)

ACDS (Advanced Cyber Defence Systems)

ACDS was founded in the belief that cyber security can be done better. We’re combining emerging technologies and proven methods to bring a new approach to tackling the growing threat landscape.