NEWS > Cybersecurity News


« Back to News

2015-05-01

Will Cyber Insurance Providers Reward Good Security?

There are three key factors that will drive demand for cyber insurance products.

2015-05-11

Hacked. Or, How to Become a Four-Star General

"Someone hacked into the Department of Defense [DoD] network," Gen. Keith Alexander

2015-05-01

Disapproved: UK College of Policing Blacklists Former Officers for Data Misdeeds

How effective are the British police at investigating internal misconduct?

2015-05-04

Germany Spied on EU Officials for the US

Germany's BND foreign intelligence agency helped the National Security Agency (NSA) carry out "political espionage".

2015-05-04

Is the US - Iran Cyber War Over?

Washington and Tehran may have come to an understanding on nuclear weapons but will the cyberwar go on?

2015-05-01

Forget Hackers, The Biggest Internet Security Threat Is Closer to Home

According to Verizon the biggest threat to your private information may actually be you!

2015-05-08

Stellar Wind: CIA analysts didn’t use the NSA’s Spy program.

CIA surveillance & bulk data collection program was so secretive that the agency was unable to make “full use” of its capabilities.

2015-04-30

How Terrorists Are Turning Robots Into Weapons

It's time to rethink security with the rise of robotics.

2015-04-28

IBM Watson is 'Moonshot' in Healthcare

Watson Health will offer cloud-based access to its IBM supercomputer for analyzing healthcare data.

2015-04-30

Cyber Security in China

Chinese Internet Security is a Key Location Factor and a Challenge to Western Businesses

2015-04-28

United Airlines Bans Researcher After 'joke tweet'

United Airlines ban a security researcher from a flight after he tweeted that he might be able to hack the aircraft's systems.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

National Cyber Security Centre (NCSC) - United Kingdom

National Cyber Security Centre (NCSC) - United Kingdom

The NCSC acts as a bridge between industry and government, providing a unified source of advice, guidance and support on cyber security, including the management of cyber security incidents.

Paramount Computer Systems

Paramount Computer Systems

Paramount is a regional leader in the Middle East for cybersecurity solutions and consulting services.

KZ-CERT

KZ-CERT

KZ-CERT is the national Computer Emergency Response Team for Kazakhstan.

Cyber Security National Lab (CINI)

Cyber Security National Lab (CINI)

The Cyber Security National Lab brings together Italian academic excellence in Cyber Security research.

Harel Mallac Technologies

Harel Mallac Technologies

Harel Mallac Technologies is a Mauritian organisation that has developed a strong network of ICT specialists with nodes across the African continent.

Cyberens

Cyberens

Cyberens provide cybersecurity consulting services in IT sectors relating to defense and space, banking, industrial control systems and IoT.

Lifespan Technology

Lifespan Technology

Lifespan Technology provides the full range of IT Asset Disposition services. This includes hardware recycling and disposal, data destruction, and hardware resale.

DDOS-Guard

DDOS-Guard

DDoS-GUARD is one of the leading service providers on the global DDoS protection and content delivery markets.

Port53 Technologies

Port53 Technologies

Port53 Technologies is focused on delivering enterprise-grade, cloud-delivered security solutions that are easy to deploy, simple to manage and extremely effective.

Avertro

Avertro

Avertro helps leaders manage the business of cyber. We help explain cybersecurity to executives, forecasting outcomes, right-sizing your spend, and validating your cyber strategy.

stackArmor

stackArmor

stackArmor specializes in compliance and security-focused solutions delivered using our Agile Cloud Transformation (ACT) methodology.

Tech Seven Partners

Tech Seven Partners

At TechSeven Partners, we provide a full suite of cyber security solutions for your business including network monitoring, onsite and cloud backup solutions, HIPAA or PCI compliance.

CyXcel

CyXcel

CyXcel is a cyber security consulting business grounded in the law which natively fuses crises, legal, technical, and consulting expertise digital networks, information and operational technology.

Internet Initiative Japan (IIJ)

Internet Initiative Japan (IIJ)

IIJ is one of Japan's leading Internet-access and comprehensive network solutions providers.

Innerworks

Innerworks

Innerworks intelligent bot detection. Innerworks is building the future of behavioural data on web3.

Hive Systems

Hive Systems

Hive Systems specialize in tailored solutions that unify risk assessments, IT, security awareness, and cybersecurity operations for businesses of all sizes.