News

2020-03-03

Where Is Iran's Cyber Response To It's General's Assassination?

Iran's threatened response to the US killing of their top military leader has yes to materialise, although their state- sponsored hackers are busy.

2020-03-18

Cyber Attacks Predicted For 2020 Summer Olympics

Supply Chain: The IOC is anxious to ensure that every third party organisation involved in the 2020 Games has adequate cyber security systems.

2020-03-17

New UK Cyber Force Targets Terror Groups

At Last: A specialist British cyber force of military & civilian hackers who can target hostile states and terror groups is ready to get going.

2020-03-17

Why 5G Is Going To Quickly Replace 4G

5G will unlock new applications that were simply not possible with 4G. Specifically, workplaces will no longer be defined by a physical location.

2020-03-06

Ransomware Attack On US Power Station

A major cyber-attack has hit a US gas compression facility, forcing it to shut it down for two days as it struggled to recover.

2020-03-03

Mexico’s Economy Ministry Falls Under Attack

Following damaging attacks on the banking system and the oil industry, the Mexican Government now finds itself a target for hackers.

2020-03-02

The Pope Speaks Out On The Ethics Of AI

The Vatican, the European Union and some of the most important technology companies agree that Artificial Intelligence needs an ethical dimension.

2020-03-02

Top Cybersecurity Threats & Solutions To Empower Every Business

It’s high time for businesses to get serious about cybersecurity and protect assets and clients. By Naomi Hodges of Surfshark

2020-03-19

Business Has Increased Cyber Security But Lacks Cyber Training

Buying equipment & services is easy. Taking the time to train people to implement secure processes and a risk-aware culture is harder.

2020-03-16

Iran's Cutting Edge Cyberwar Capabilities

Iran has the skills to conduct attacks against its enemies across numerous sectors, including energy, financial services & critical infrastructure.

2020-03-13

UK Government: Mobile Devices Lost & Stolen

British government employees lost 1,474 devices in 12 months, 347 were reported stolen and 183 were either lost or stolen. Many were unencrypted.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

idappcom

idappcom

idappcom provides unique industry approved software solutions for auditing and enhancing the threat recognition and response capabilities of your corporate security defences.

TruSTAR Technology

TruSTAR Technology

TruSTAR is a threat intelligence exchange platform built to protect and incentivize information sharing.

Slovenian Digital Coalition

Slovenian Digital Coalition

Slovenian Digital Coalition is a coalition working in the field of smart cities, e-commerce, e-skills, e-inclusion, cyber security, internet and other areas related to developing the digital society.

Startups.be

Startups.be

Startups.be helps tech entrepreneurs to be successful by providing quality access to service providers, business partners, customers and investors.

Citalid

Citalid

The Citalid cyber risk management platform combines threat and business intelligence to identify the risks scenarios you face.

Softcat

Softcat

Softcat offer a broad portfolio of IT services and solutions covering Hybrid Infrastructure, Cyber Security, Digital Workspace and IT Intelligence.

Telsy

Telsy

Telsy is a security partner for ICT solutions and services. We help you implement effective security solutions that increase your risk mitigation ability and your responsiveness.

Ward Solutions

Ward Solutions

Ward Solutions are an information security consultancy and managed services company. We help organisations protect their brand, people, assets, intellectual property and profits.

Saporo

Saporo

Saporo helps organizations increase their cyber-resistance. Continuously map your attack surface and get the recommendations you need to make your organization more resistant to attacks.

G-71

G-71

G-71 LeaksID is a cutting-edge ITM technology aimed at safeguarding sensitive documents from insider threats.

Sycope

Sycope

Sycope is focused on designing and developing highly specialised IT solutions for monitoring and improving network and application performance.

DESCERT

DESCERT

DESCERT offers you an extended IT, cyber security, risk advisory & compliance audit team which provides strategic guidance, engineering and audit services.

Finite State

Finite State

Finite State enables product security teams to protect the devices we rely on every day through market-leading software threat, vulnerability, and risk management.

Allstate Identity Protection

Allstate Identity Protection

Allstate make it easy to provide complete identity protection, so everyone can live more confidently online.

Amyna Systems

Amyna Systems

Amyna has developed an IoT cybersecurity platform that prevents malignant attacks, helping users to protect themselves from cyberattacks.

Amplifier Security

Amplifier Security

Amplifier Security are on a mission to empower security teams to modernize their practice by connecting the dots between their security stack and their people.