NEWS > Cybersecurity News


« Back to News

2015-03-09

How you could become a victim of cybercrime in 2015

Cybersecurity experts' predictions for the year ahead:

2015-03-10

The Future of Government Surveillance - Looks Like This

Modern targeted surveillance is likely to involve actively breaking into an adversary's computer network and installing malicious software.

2015-03-09

More CEOs Discover Power of Analytics

CEOs are looking to digital tools such as data analytics, mobile, cybersecurity and the Internet of Things to help them seize bigger opportunities ..

2015-03-06

What happens when the Internet of Things becomes AI?

When Stephen Hawking, Bill Gates and Elon Musk all agree on something, it’s worth paying attention.

2015-03-09

Snowden Ready to Return to the US 'if he can get a fair trial'

Former U.S. National Security Agency employee Edward Snowden is ready to return home if he is guaranteed a fair trial, says his lawyer.

2015-03-03

Could the Internet be the next ‘failed state’?

If you think the Internet can go on being just like it is, here's some bad news. In the New York City of the late 1970s, things looked bad. The city government was bankrupt, urban blight was rampant, and crime was high. But people still went to the city every day because that was where everything was happening. And despite the foreboding feelings hanging over New York at the time, the vast majority of those people had at most minor brushes with crime.

2015-02-19

Memex – The new search tool for the Deep Web

DARPA has publicly presented for the first time a new set of search tools called Memex, which will improve also researches into the “Deep Web”.

2015-02-28

How News Cards Are Quietly Transforming The Web

Cards, a technology that collapses online content into digital containers for fast and easy consumption has begun a transformation across the web.

2015-03-19

MI5 seeks new powers after Paris magazine attack

Head of MI5 Andrew Parker describes Charlie Hebdo outrage as ‘a terrible reminder of the intentions of those who wish us harm’

2015-03-05

Google Cloud offers security scanning for customer apps

Google Cloud Security Scanner, now available as a free beta for Google App Engine users..

2015-03-02

How the US Military will fight ISIS on the Dark Web

The Dark Web is not so much a place as it is a method of achieving a level of anonymity online.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NextPlane

NextPlane

NextPlane provide secure real-time B2B unified communication and collaboration solutions within and across business systems.

Marsh

Marsh

Marsh is a global leader in insurance broking and risk management and has been a leader in combatting cyber threats since their emergence.

APWG

APWG

APWG is the international coalition unifying the global response to cybercrime across industry, government, law-enforcement and NGO communities.

Granite Partners

Granite Partners

Granite is a cloud service for the development of business risk management, cyber security and privacy and occupational safety and health.

ESNC

ESNC

ESNC’s vulnerability management and real-time SAP security monitoring solutions help largest corporations in the world to effectively prioritize SAP security tasks and secure their business.

netfiles

netfiles

netfiles offers highly secure data rooms for sensitive business processes and secure data exchange.

Greenetics Solutions

Greenetics Solutions

Greenetics Solutions is a company focused on providing solutions for information security.

CyberStream

CyberStream

CyberStream, a division of the TechStream Group, is an information & cybersecurity talent acquisition solution provider.

BotGuard

BotGuard

BotGuard provides a service to protect your website from malicious bots, crawlers, scrapers, and hacker attacks.

ACET Solutions

ACET Solutions

ACET Solutions delivers a wide range of Automation, Cyber Security and Enterprise IT/OT Integration Solutions to industrial clients.

e360

e360

e360 (formerly Entisys360) is an award-winning IT consultancy specializing in advanced IT infrastructure, virtualization, security, automation and cloud first solutions.

Newberry Group

Newberry Group

The Newberry Group provides comprehensive IT services and solutions that optimize operations, minimize risk and deliver measurable business value.

Nassec

Nassec

Nassec is a Cyber Security firm dedicated to providing the best vulnerability management solutions. We offer tailor-made cyber security solutions based upon your requirements and nature of business.

Liberman Networks

Liberman Networks

Liberman Networks is an IT solutions provider company that provides security, management, monitoring, BDR and cloud solutions.

Telstra

Telstra

Telstra is one of the world's leading telecommunications and technology companies, offering a wider range of services from networks and cloud solutions to mobility and enterprise collaboration tools.

Falconfeeds

Falconfeeds

Falconfeeds empowers businesses and security professionals with immediate access to the latest and historical threat intelligence data.