NEWS > Cybersecurity News


« Back to News

2022-03-14

AI Is The Future Of Defensive Cyber Security

AI can help reduce costs, improve threat response times and respond to breaches, regardless of the  specific circumstances in which it is used.

2022-03-12

New Tools To Detect Cyber Attacks

Automated monitoring of fluctuations in energy consumption across networks can help detect and protect critical IT infrastructure from hackers.

2022-03-10

Twitter Joins Ukraine’s War Effort

Twitter has been a powerful weapon in many conflicts, used to spread propaganda & fake news. Now, it has picked a side and will defend Ukraine.

2022-03-10

A Cyber Attack On NATO Could Trigger Article 5

In the era of 'hybrid warfare' will NATO respond to a cyber attack on a member state in the same way as it would to an armed miiltary attack?

2022-03-08

Microsoft Exchange Exploited By ‘Cuba’

The Cuba ransomware gang target vulnerabilities on public-facing Microsoft Exchange software to detect susceptible networks.

2022-03-09

NATO Tests A Post-Quantum VPN

Post-Quantum technology provides different powerful algorithms to ensure security, even when facing attackers using quantum computing.

2022-03-08

Russia Threatens To Block Wikipedia

Don't Mention Ukraine: The national media regulator, Roskomnadzor, says that if editors don't comply, it will block all of Wikipedia from Russia

2022-03-08

Phishers Are Moving In On LinkedIn

Criminals are using LinkedIn to steal your data. If you get sent a link to LinkedIn.com via email, SMS/text or instant message, don't click on it.

2022-03-07

Mark Zuckerberg's Vision: How AI Will Unlock The Metaverse

The metaverse, a futuristic idea of virtual environments where users can work, socialise and play, will ultimately replace the mobile Internet.

2022-03-07

Update: The Online War In Ukraine

As events in Ukraine move quickly, it has become clear that this is the first armed conflict to use the Internet as an alternative front-line.

2022-03-04

Ukraine Targeted With Ghostwriter Phishing Campaign

An intense phishing campaign on Ukraine is linked to a Belarussian hacking group known to have attacked Poland and other EU member nations.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

SQA Service

SQA Service

SQA Service provide independent software and process Quality Assurance services.

Subgraph

Subgraph

Subgraph is an open source security company, committed to making secure and usable open source computing available to everyone.

Omada

Omada

Omada is a leading provider of IT security solutions and services for identity management and access governance.

Chronicle

Chronicle

Chronicle products combine intelligence about global threats in the wild, threats inside your network, and unique signals about both.

Scout Ventures

Scout Ventures

Scout Ventures is an early stage venture capital firm that is making the world a better, safer place by cultivating standout frontier technologies.

Stamus Networks

Stamus Networks

Stamus Networks offers Scirius Security Platform solutions that marry real-time network traffic data with enhanced Suricata intrusion detection (IDS) and an advanced analytics engine.

GreyNoise Intelligence

GreyNoise Intelligence

GreyNoise Intelligence is a cyber security company that collects, labels, and analyzes Internet-wide scan and attack data.

Motorola Solutions

Motorola Solutions

Motorola Solutions build mission-critical services, software, video and analytics, backed by secure, resilient land mobile radio communications.

Inpher

Inpher

Inpher has pioneered cryptographic Secret Computing® that enables advanced analytics and machine learning while keeping data private, secure, and distributed.

ISMAC

ISMAC

ISMAC was founded to create a security solution that would work for smaller to medium as well as bigger corporations at an affordable price.

Information Security Officers Group (ISOG)

Information Security Officers Group (ISOG)

ISOG's mission is to strengthen information security through awareness and education programs, promoting community and fellowship among information security leaders.

CatchProbe Intelligence Technologies

CatchProbe Intelligence Technologies

CatchProbe provides actionable web intelligence, OSINT, deception systems, threat intelligence, and digital crime analytics solutions and products through an AI-Driven intelligence platform.

Ruptura InfoSecurity

Ruptura InfoSecurity

Ruptura InfoSecurity provide CREST Accredited Penetration Testing & Offensive Security Services. We secure your critical assets through targeted and research driven penetration testing.

PCCW Global

PCCW Global

PCCW Global is a leading communications service provider, offering mobility, voice and data solutions to multinational enterprises, telecomms partners, cloud and application service providers.

Applied Insight

Applied Insight

Applied Insight work closely with government agencies and industry to overcome technical and cultural hurdles to innovation, empowering them with the latest cloud, data and cyber capabilities.

Clumio

Clumio

Clumio provides autonomous backup and recovery for critical cloud data.