News

2019-08-14

Training Robots & Human Bias

Robotic development is creating computer systems which can substitute and replicate both human actions and human fallibility.

2019-08-14

N. Korea’s Hackers Stole $2b To Fund Its Missile Program

Money stolen from foreign financial institutions by cyber-attacks is now being spent on North Korea's frightening nuclear weapons build-up.

2019-08-14

Microsoft Say The IoT Is Under Attack

One of Russia's elite state-sponsored hacking groups is going after IoT devices as a way to breach corporate networks.

2018-10-05

Russian Agents Are Behind Many Recent Attacks

The British NCSC says that the Russian GRU intelligence agency has long been carrying out widespread 'false flag' cyber attacks.

2019-08-13

Shockwave - A Global Transformation In Warfare

An electronic revolution is happening far quicker than previous revolutions and will significantly change the nature of warfare. By Alfred Rolington

2019-08-13

Cyber Security Jobs & The Skills Gap

IT and Cyber professionals with the requisite knowledge and skills are highly sought after. How can you navigate a new career in cyber security?

2019-08-13

Is The Cloud Skills Gap A Problem?

A lack of talent and skills in the IT sector is a big problem for business. For example, the transition to the cloud, which is now mainstream technology.

2019-08-12

Bank Creates Its Own AI To Identify & Disintegrate Malware

JPMorgan Chase is integrating Artificial Intelligence into its internal security systems to thwart malware infections within its own networks.

2019-08-12

US National Security Agency’s Cyber Offensive

The NSA is forming a new directorate to more closely align the agency’s offensive and defensive operations and to become more aggressive.

2019-08-12

UK Power Outage - The Cyber Effect?

Blackout: Cities, towns, hospitals and transport networks across England and Wales lost electrical power, affecting around 1m UK citizens.

2019-08-09

FBI Turns To Social Media To Track Shooters

The US is growing used to the painful reality of the weaponisation of social media to cause harm. Now the FBI want to use it as an alerting tool.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Secure Identity Alliance (SIA)

Secure Identity Alliance (SIA)

The Secure Identity Alliance is dedicated to supporting sustainable worldwide economic growth and prosperity through the development of trusted digital identities and the adoption of secure eServices.

QTS

QTS

QTS Realty Trust, Inc. is a leading provider of secure, compliant data center, hybrid cloud and managed services.

Australian Signals Directorate (ASD)

Australian Signals Directorate (ASD)

The Australian Signals Directorate is an intelligence agency in the Australian Government Department of Defence.

Sopra Steria

Sopra Steria

Sopra Steria is a leading European information technology consultancy.

PCI Pal

PCI Pal

PCI Pal’s secure cloud payment solutions are certified to the highest level of security by the leading card companies.

DocAuthority

DocAuthority

DocAuthority automatically discovers and accurately identifies unprotected, sensitive documents, enabling a broad yet business-friendly security policy.

Y-PARC

Y-PARC

Y-PARC is a center of excellence for cybersecurity, precision industries and medtech, fostering innovation and development and support for startups.

GroupSense

GroupSense

GroupSense helps governments and enterprises take control of digital risk with cyber reconnaissance, counterintelligence and monitoring for breached credentials.

HancomWITH

HancomWITH

Hancomwith is an information security company. We provide optimized blockchain solutions in areas including next-generation authentication, security and digital asset transaction.

riskmethods

riskmethods

riskmethods helps you proactively identify, assess and mitigate supply chain risk. You need to master supply chain risk management—we can help.

Epiphany Systems

Epiphany Systems

Epiphany enhances your defensive security controls by providing you with an offensive perspective. We expose the most likely attack paths to your most critical IT assets and users.

Scrut Automation

Scrut Automation

Scrut Automation's mission is to make compliance less painful and time consuming, so that businesses can focus on running their business.

Cloud Range

Cloud Range

Cloud Range provides cybersecurity teams with access to the world's leading cyber range platform, eliminating the need to invest in costly cyber range infrastructure.

Trustifi

Trustifi

Trustifi leads the market with the easiest to use and deploy email security products, providing both inbound and outbound email security from a single vendor.

Quotient

Quotient

Quotient builds digital experiences that empower and inspire the American people by understanding their needs, simplifying complex technical solutions and adapting to how they work, live and learn.

Phone Monitoring Service

Phone Monitoring Service

Phone Monitoring Service provides cyber security services, ethical hacking services, social media hacking services in the USA, Canada, Europe.