NEWS > Cybersecurity News


« Back to News

2019-08-21

Cyberwar Between Nation-States Damages Business

Businesses are at risk of becoming “collateral damage” in nation-state cyber conflicts and need to be protected in a fundamentally new way.

2019-08-14

Training Robots & Human Bias

Robotic development is creating computer systems which can substitute and replicate both human actions and human fallibility.

2019-08-14

N. Korea’s Hackers Stole $2b To Fund Its Missile Program

Money stolen from foreign financial institutions by cyber-attacks is now being spent on North Korea's frightening nuclear weapons build-up.

2019-08-13

Cyber Security Jobs & The Skills Gap

IT and Cyber professionals with the requisite knowledge and skills are highly sought after. How can you navigate a new career in cyber security?

2019-08-09

IBM X Force Dissect The Destructive Power Of Malware

Organisations previously thought safe from this form of cyber aggression increasingly find themselves affected, either directly or indirectly.

2019-08-07

British Army Reshapes Itself To Fight Cyberwars

Computer hackers and propaganda specialists are to form 6th Division, reflecting a doctrine that the boundaries between peace and war are fading.

2019-08-06

More About The Capital One Breach

Details are emerging about the massive breach affecting over 100 million credit card customers of CapitalOne, which first went unnoticed.

2019-08-06

Cyber Terrorism & Piracy

Terrorism today is a widening series of global alliances, supported and connected via social media and fake news. By Alfred Rolington

2019-08-06

Malware Attacks Drop As Encrypted Attacks Increase

Malware is down, but it's getting more malicious in terms of the type of malware and how it is delivered. Ransomware is now a SAAS offering.

2019-08-05

We Can Reduce Cybercrime, But Why Are We Failing?

Devin Smith puts cybercrime under a magnifying glass, intending to combat or at least limit the malicious practices of criminal malpractitioners.

2019-08-01

Four Questions To Ask After An Attack

Swift and comprehensive incident response is a critical step to ensuring the future security of a business and protecting its reputation.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

IT GRC Forum

IT GRC Forum

The IT GRC Forum is an online resource and networking platform for the Governance, Risk Management, and Compliance (GRC) community

InformationWeek

InformationWeek

InformationWeek is the world's most trusted online community for business technology professionals like you.

Linklaters LLP

Linklaters LLP

Linklaters is an international law firm. Practice areas include Information Management and Data Protection.

Cybertrust Japan

Cybertrust Japan

Cybertrust Japan provides a comprehensive security certification and digital authentication service, enabling customers to build and manage highly secure IT infrastructures.

Alan Turing Institute

Alan Turing Institute

Alan Turing Institute is the UK national institute for data science. A major focus is Big Data analysis with applications including cyber security.

Riskified

Riskified

Riskified is a leading eCommerce fraud-prevention company, trusted by hundreds of global brands – from luxury fashion houses and retail chains, to gift card and ticket marketplaces.

Keepnet Labs

Keepnet Labs

Keepnet Labs is a phishing defence platform that provides a holistic approach to people, processes and technology to reduce breaches and data loss and presents anti-phishing solutions.

Uleska

Uleska

Uleska is a scalable platform that provides automated and continuous software security testing whilst translating cyber risk.

Valire Software

Valire Software

Valire provide a solution for the automated detection of internal fraud.

Cervello

Cervello

Cervello is a leading provider of comprehensive and proven solutions to protect railways against cyber attacks.

Gordian Networks

Gordian Networks

Gordian Networks offers complete managed IT services and IT support for small to large businesses.

MalwareFox

MalwareFox

MalwareFox is an advanced, yet simple-to-use anti-malware solution for Windows computers. We provide aggressive detection capabilities and an effective malware removal tool to keep your systems safe.

HALOCK Security Labs

HALOCK Security Labs

HALOCK is an information security consultancy providing both strategic and technical security offerings.

VeriBOM

VeriBOM

VeriBOM is a SaaS security and compliance platform that helps protect you and your customers through automation, documentation, and transparency for every software application you build or run.

NinjaOne

NinjaOne

The NinjaOne Platform was built to help IT and MSP teams efficiently manage, patch, and support all endpoints.

NetSentries Technologies

NetSentries Technologies

NetSentries provide smart cybersecurity solutions and services to protect Governments, Enterprise and Individuals from threats through a comprehensive range of protocols, products and services.