NEWS > Cybersecurity News


« Back to News

2015-06-15

Instilling a Culture of Cyber Security

Companies selling cyber security say their tools will “defend” & “protect”. The reality is technology creates a false sense of security.

2015-06-15

UK Web Snooping Powers Are 'Undemocratic'

A review UK of phone & Internet surveillance says current "undemocratic and unnecessary" laws need a complete overhaul.

2015-06-15

The Bright Horizon For Information Security Jobs

At least one group of graduates is poised to take advantage of a massive skills shortage: cybersecurity professionals.

2015-06-15

Europol: Dozens Arrested in Cybercrime Sweep

Police arrest 49 suspected members of a cyber crime syndicate in Spain, Poland and Italy.

2015-06-16

US Government Employee Hack & the Future of Warfare

The massive hack of the US federal government may have compromised personal information belonging to as many 14 million people.

2015-06-15

Enforcing Magna Carta in the Age of Cyberwarfare

In a modern secular society it's doubtful that many people would be happy with the Archbishop of Canterbury as the prime guardian of Civil Liberties.

2015-06-15

MI6: Snowden Files Hacked to Find Western Spies

Controversey: Have Russian & Chinese intelligence agencies used documents from Edward Snowden to identify British and US secret agents?

2015-06-13

Second Hack of US Federal Records

14 million current & former US government employees have had their personal information exposed to hackers.

2015-06-11

Anderson Report: Review Of UK Anti-Terror Data Laws.

The UK Government will publish a comprehensive review of laws governing bulk interception of communications on mobile phones & the Internet.

2015-06-09

NSA Planned to Plant Malware via Google & Samsung Phones

An NSA app-hijacking program, dubbed IRRITANT HORN, deployed to bug users mobile phones.

2015-06-09

UK Secret Report Urges US Data Sharing

Top secret report to the UK Prime Minister recommends a new international treaty to enforce cooperation of the US Internet giants.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CloudEndure

CloudEndure

CloudEndure offers Disaster Recovery and Continuous Replication for the Cloud.

Bloombase

Bloombase

Bloombase is the leading innovator in Next-Generation Data Security solutions for Global 2000-scale organizations

TrustArc

TrustArc

TrustArc provide privacy compliance and risk management with integrated technology, consulting and TRUSTe certification solutions – addressing all phases of privacy program management.

VivoSecurity

VivoSecurity

VivoSecurity is a pioneer in cyber risk quantification based on data science. Our products and services help organizations achieve optimal information security and GRC programs.

Titanium Industrial Security

Titanium Industrial Security

Titanium Industrial Security specializes in advising and accompanying companies on cybersecurity in Connected Industry (Industry 4.0 / Smart Factory / IIoT).

OneTrust

OneTrust

OneTrust is the largest and most widely used technology platform to operationalize privacy, security and third-party risk management.

World Congress on Industrial Control Systems Security (WCICSS)

World Congress on Industrial Control Systems Security (WCICSS)

The World Congress on Industrial Control Systems Security (WCICSS) is focused on emerging trends in protection of industrial control systems.

Accelerator Frankfurt

Accelerator Frankfurt

Accelerator Frankfurt is an independent go-to-market program focused on Fintech, Cybersecurity and Digital B2B startups.

AirEye

AirEye

AirEye is a leader in Network Airspace Protection (NAP). Block attacks against your corporate network launched from wireless devices in your corporate network airspace.

People Driven Technology

People Driven Technology

People Driven Technology is a customer-obsessed organization. We leverage our decades of business, technology, and engineering experience to deliver outcomes for our clients.

American Technology Services (ATS)

American Technology Services (ATS)

American Technology Services provides unparalleled services in information technology to support small and mid-sized business. From top-level strategy, to managed services and infrastructure support.

Bluewave

Bluewave

Bluewave are a strategic IT advisory company that offers businesses a simple and comprehensive way to purchase information technology solutions.

US Department of State - Bureau of Cyberspace & Digital Policy

US Department of State - Bureau of Cyberspace & Digital Policy

The Bureau of Cyberspace and Digital Policy leads and coordinates the Department’s work on cyberspace and digital diplomacy to encourage responsible state behavior in cyberspace.

OryxLabs

OryxLabs

OryxLabs provide advanced enterprise digital risk protection solutions. Learn more about how 24x7 continuous assessment, monitoring, and improvement can secure your network.

CyberSecureRIA

CyberSecureRIA

We founded CyberSecureRIA specifically to secure and support RIAs. We exist to secure SEC-registered RIAs, and keep them compliant with cybersecurity regulations.

DarkHorse Security

DarkHorse Security

DarkHorse exists to make it easy and affordable for organizations to be able to identify their cybersecurity vulnerabilities.