Julian Assange - One Hour Live stream in Central London

www.cybereurope.events

Julian Assange is the face of WikiLeaks, the headline-making publishing organisation famous around the world for releasing secret information from corrupt governments, unaccountable corporations, occupying militaries and secretive international trade deals. Founder, philosopher, editor-in-chief and original financier, his name and the WikiLeaks brand are inseparable, and both have proven indomitable over the organisation’s 10 year publishing history.

 

Combating seven common threat techniques in 2018

Friday, 6 April, 2018

By Keiron Shepherd, Senior Security Specialist, F5 Networks  With automated tools and hackers for hire, cybercrime has turned into a…

Cyber security – is it a science?

Tuesday, 25 April, 2017

  Chris Few, foreseeti UK business manager, discusses the ability of the cyber security profession to make testable predictions of…

View
View All

The risks of not being GDPR compliant

Monday, 7 August, 2017

  There has been loads written and talked about surrounding General Data Protection Regulation (GDPR). The new regulation is arguably…

View
View All

Complying With GDPR: What all Organisations Need to Know

Tuesday, 13 June, 2017

  Data protection laws are more important than ever before as individuals are becoming more and more sensitive about privacy, data…

View
View All
Latest News

How to Build a Cybersecurity Incident Response Plan

Friday, 6 April, 2018

Being hit by a cyberattack is going to be painful. But it can be less painful if you’re prepared, and…

Automating Ethics for Cybersecurity

Wednesday, 28 March, 2018

Having a code of ethics and enforcing it are two different things. Doctors, accountants, and lawyers all operate under a…

Kaspersky Lab Seeks Injunction Against US …

Sunday, 21 January, 2018

Revenues and reputation have taken a hit in the wake of the US Department of Homeland Security’s decision to prohibit…

Unprotected Pentagon Database Stored 1.8 Billion Internet Posts

Monday, 20 November, 2017

Researchers have found an unprotected database storing 1.8 billion posts collected from social media services, news websites and forums by…

GDPR Strategies

We are excited to launch our new dedicated section for The General Data Protection Regulation, providing key insights to ensure your organisation complies. With contribution from key bodies such as the European Commission and the European Parliament. Read More


The Future of Cyber Security on Sky News


 

Watch out hacked companies, Firefox is going to tell the world about your data leaks

Thursday, 23 November, 2017

Firefox, the internet browser developed and maintained by Mozilla, will soon have the ability to warn internet users if the…

Most Read Articles

Can Machine Learning Outsmart Malware?

Wednesday, 11 October, 2017

Using machine learning in the cybersecurity domain is a growing trend with many advantages, but it also has its risks….

Watch out for these high-pressure Apple malware scams – Naked Security

Wednesday, 11 October, 2017

We noticed a lull in recent months in emails and web pages that SHOUT THAT YOUR MAC IS INFECTED and…

image

Most Profiles Likely Scraped by Third Parties

Friday, 6 April, 2018 In Featured News, General News

Facebook announces plans to restrict data access after 87 million users’ data was improperly shared with Cambridge Analytica. Data belonging…

How to Build a Cybersecurity Incident Response Plan

Friday, 6 April, 2018 In General News, Other News

Being hit by a cyberattack is going to be painful. But it can be less painful if you’re prepared, and…

Combating seven common threat techniques in 2018

Friday, 6 April, 2018 In Editorial, General News

By Keiron Shepherd, Senior Security Specialist, F5 Networks  With automated tools and hackers for hire, cybercrime has turned into a…

780 Days in the Life of a Computer Worm

Wednesday, 28 March, 2018 In Featured News, General News

This is a story of a worm, from the time it was coded and deployed onto the Internet. It is…

Getting Ahead of Internet of Things Security in the …

Wednesday, 28 March, 2018 In Editorial, Featured News, General News

In anticipation of an IoT-centric future, CISOs must be rigorous in shoring up defenses that provide real-time insights across all…

image
Latest Videos
Polls
Sorry no Polls available - check back soon