News

2020-02-12

Massive Growth In Britain's Cyber Security Sector

British Cyber Business Is Booming: UK cyber revenues are up 46% from £5.7bn in 2017 with £1.1bn invested, the industry is now worth £8.3bn.

2020-02-12

Is Widespread Suspicion Of Huawei Justified?

British MPs are opposing the decision to allow untrusted Huawei access to 5G infrastructure, whilst China insists it has nothing to do with them.

2020-02-11

US Government Cyber Security Still Needs Work

The US State Department has consistently failed to secure its IT systems from cyber attacks, reflecting a general mismanagement of resources.

2020-02-11

Faster Digital Forensic Analysis

Examining seized devices for incriminating evidence is a time-consuming process. A new set of speedy digital forensic tools will change all that.

2020-02-10

Attack Vectors Are Proliferating

The range of threat vectors is growing fast and inceasing connectivity broadens the potential attack surface, for everone and everything.

2020-02-10

Spies Really Like Artificial Intelligence

AI is helping US spy agencies reach analytical conclusions with instantaneous machine translation, speech recognition and data collection.

2020-02-10

Fake News Uses Coronavirus To Spread Malware

Cybercriminals are using fake email messages about coronavirus Covid-19 to spread the destructive Emotet Trojan, along with other malware.

2020-02-10

Big Cyber Attack Hits Iran

Digital Fortress: Internet connectivity in Iran dropped to 75% after a 'powerful' DDoS attack that targeted Iran's telecom services this weekend.

2020-02-10

The Geopolitics Of Cybersecurity

Reading List: The technological transformation emerging from cyberspace is like nothing else before. Dr. Jayshree Pandya looks at the issues.

2020-02-07

Market Growth Leads To Better Job Opportunities

Cybersecurity firms are having more trouble attracting and keeping skilled workers to help protect networks as the Skills Shortage grows.

2020-02-12

WEBINAR: How To Leverage Endpoint Detection & Response (EDR) In AWS Investigations

Thursday, February 20 | Join SANS & AWS Marketplace to learn about adding EDR features to your Amazon Web Services environment.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ASIS International

ASIS International

ASIS International is a global community of security practitioners with a role in the protection of assets - people, property, and/or information.

AMETIC

AMETIC

AMETIC, is the Association of Electronics, Information and Communications Technologies, Telecommunications and Digital Content Companies in Spain.

Untangle

Untangle

Untangle provides network security products designed specifically for the below-enterprise market, safeguarding businesses, home offices, nonprofits, schools and governmental organizations.

Spire Solutions

Spire Solutions

Spire Solutions is the Middle East & Africa region’s leading cybersecurity solution provider and value-added distributor (VAD).

AVeS Cyber Security

AVeS Cyber Security

AVeS combines expert knowledge and services with leading technology products to provide comprehensive Information Security and Advanced IT Infrastructure solutions.

PeckShield

PeckShield

PeckShield is a blockchain security company which aims to elevate the security, privacy, and usability of entire blockchain ecosystem by offering top-notch, industry-leading services and products.

NETRIO

NETRIO

If you are looking for a highly mature, exceptionally competent Managed Service Provider, NETRIO has solutions to keep your business running at warp speed with zero disruptions.

ITTAS

ITTAS

ITTAS is a multidisciplinary company specializing in information security and software and hardware protection software.

Cyber Lockout

Cyber Lockout

Comprehensive ransomware insurance and preventative cybersecurity technology solution, working together to help protect businesses 24/7/365.

Mr Backup (MRB)

Mr Backup (MRB)

MRB offers Data Protection as a Service for businesses looking to reduce the time, cost and complexity of securing your company data.

HarfangLab

HarfangLab

HarfangLab develops a hunting software to boost detection and neutralization of cyberattacks against companies endpoints.

Beyon Cyber

Beyon Cyber

Beyon Cyber offer a complete portfolio of advanced solutions & services for cyber security in Bahrain.

Cisilion

Cisilion

Cisilion's mission is simple – to transform and connect business with next-generation IT infrastructure. Our expertise includes enterprise networking, security, data centre & cloud, managed services.

Threat Con

Threat Con

Threat Con is a one of its kind event in Nepal, a series of annual international security conventions similar to the famous Black Hat and DEF CON conferences.

ShieldIO

ShieldIO

ShieldIO Real-Time Homomorphic Encryption™ enables your organization to reach regulatory compliance without compromising data availability.

Cyberhill Partners

Cyberhill Partners

Cyberhill is a professional engineering services firm solving complex software implementation and integration challenges.