NEWS > Cybersecurity News


« Back to News

2015-06-16

Australia is 'one of most aggressive' in Mass Surveillance

Snowden supporters say Australia’s new data retention laws are 'dangerous'.

2015-06-16

Hackers Offered $1k for Vulnerabilites Found in Drupal 8

The Drupal security team are turning to white hat hackers to get higher levels of security.

2015-06-16

Flash Player Attacked in Latest Cyber-Crime

Hackers' persistent attacks on Adobe Flash Player's obsolete editions get worse.

2015-06-16

PWC 2015 Information Security Breaches Survey

PWC survey aims to provide greater awareness amongst UK business on how companies are (not) mitigating cyber risks.

2015-06-16

GCHQ Lack Staff for 'umbrella' Cyber Surveillance

Do GCHQ have enough skilled people to carry out effective mass surveillance?

2015-06-16

Snowden Revelations Costly for US Tech Firms

US cloud computing firms could lose between $22 billion and $35 billion in overseas business.

2015-06-16

Russia Hacked The German Parliament

The German government says the hack of the Bundestag came from Russia in a state-sponsored attack.

2015-06-16

GCHQ uses Cyber Techniques Outlawed in US

GCHQ collects “bulk personal datasets” from millions of phone & internet records using techniques now banned in the US.

2015-06-16

‘Don’t Risk IT – Cyber Secure IT’

The 2015 ISBS Survey reveals that 90% of large organisations reported suffering a security breach, up from 81% in 2014.

2015-06-16

Seven Critical Criteria for Cloud Data Encryption

Encrypting the huge number of data files stored in a public cloud is like bubble-wrapping a house.

2015-06-16

Dark Web Drug Dealers Specialised in ‘party packs’

Convicted: Two drug traffickers, who ran a drug ‘party pack’ used the ‘Silk Road’ to move illegal drugs.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

National Cyber Security Centre (NCSC) - United Kingdom

National Cyber Security Centre (NCSC) - United Kingdom

The NCSC acts as a bridge between industry and government, providing a unified source of advice, guidance and support on cyber security, including the management of cyber security incidents.

VU Security

VU Security

VU is a specialist in Cybersecurity software development with a focus on the prevention of fraud and identity theft.

Information and Communication Technology Authority (ICT Authority) - Kenya

Information and Communication Technology Authority (ICT Authority) - Kenya

The ICT Authority is responsible for enforcing ICT standards in Government and ensuring information security.

MrLooquer

MrLooquer

MrLooquer provide a solution to automatically discover the assets of organizations on the internet, determine the level of exposure to attacks and help to manage risk accurately.

Secure IT Disposals

Secure IT Disposals

Secure IT Disposals specialise in professional Computer Recycling, Computer Disposals, Computer Destruction, Data Erasure and end-of-lifecycle solutions.

3wSecurity

3wSecurity

3wSecurity provides visibility to your company’s internet facing systems throughout the security life cycle, allowing for a more thorough approach to vulnerability management.

Alacrinet

Alacrinet

Alacrinet is an IT and cyber security consultancy. From penetration testing to fully managed MSSP, our team is focused on knowing the latest threats, preventing vulnerabilities, and providing value.

JFrog

JFrog

JFrog is on a mission to enable continuous updates through Liquid Software, empowering developers to code high-quality applications that securely flow to end-users with zero downtime.

Chartered Institute of Information Security (CIISec)

Chartered Institute of Information Security (CIISec)

CIISec is dedicated to helping individuals and organisations develop capability and competency in cyber security.

Artifice Security

Artifice Security

Artifice Security will demonstrate real-world attacks on your network, web applications, infrastructure, and personnel to expose your hidden security risks.

Fusion Cyber

Fusion Cyber

Fusion Cyber educates students in Zero Trust Risk Management, Defense, and Cyber Offense that lead to taking industry-accepted cybersecurity certifications.

CodeLock

CodeLock

Codelock is a patent-pending solution that continuously provides software security at the code level, while providing advanced management insights with performance metrics and data analytics.

Digital Security Authority (DSA)

Digital Security Authority (DSA)

The establishment of the Digital Security Authority, which incorporates the National CSIRT, is crucial to significantly raising the cybersecurity posture and capabilities of Cyprus.

LEPHISH

LEPHISH

LePhish is a French cybersecurity solution specializing in automated phishing campaigns.

MIND

MIND

MIND is the first-ever data security platform that puts data loss prevention and insider risk management programs on autopilot, so you can automatically identify, detect and prevent data leaks.

Cloudsmith

Cloudsmith

Cloudsmith is the only cloud-native, global, universal artifact management platform for securely developing and distributing software.