News

2019-05-03

Beware Of ‘How To' Guides To The Dark Web

Hacking For Dummies: All you need to get rich quick is some good tutorial material from the Dark Web, right? Wrong.

2019-05-03

Cyber Criminals Are Catching Up With Nation-state Hackers

Sophisticated cyber criminals are starting to franchises their hacking tools and to develop new technology to sell to other cyber criminals.

2019-05-02

Russia Plans To Monitor Internet Access

The 'sovereign Internet law” isolates domestic online traffic by requiring it pass through servers run by the national Internet regulation agency.

2019-05-01

GCHQ Chief Wants A Big Effort To Improve British Cybersecurity

Spy chief Jeremy Fleming says that government, academia and industry in the UK must increase the level of cybersecurity collaboration.

2019-05-01

Authenticating Digital Evidence

With a huge growth of digital media, the question of what types of evidence available to the police that are also admissible in court is complex.

2019-05-01

EU Elections: Facebook Prepares

Facebook is preparing to tackle interference campaigns aimed to misinform and manipulate voters ahead of the EU's elections this month.

2019-07-01

Easy Cyber Knowledge: Ch.1 Internet History

A clear strategic perspective and actionable methodologies to help organisations adapt in the evolving CyberScape. By Alfred Rolington

2019-04-30

Social Media Crime Is A Threat To Business

Employees are devoting more than three hours per week to sites proven to be hotbeds of malware and that is affecting the businesses they work for.

2019-04-30

Nasty Phishing Scam Targets Instagram

The Nasty List: Instagram is cautioning users not to fall for a widespread phishing scam which is trying to collect log-ins and hack users accounts.

2019-04-30

The IoT Is A Big Headache For Software Developers

Connectivity, performance, and standards are growing areas of concern as the Internet of Things moves from concept to production reality.

2019-04-29

France’s National Cybersecurity Policy: Both Defend & Attack

In a major policy statement the French government says it will use its cyber arms as offensive weapons, as well as to respond an attack.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

PrimaTech

PrimaTech

PrimaTech provide process safety, cyber and process security, and risk management consulting, training and software for the process industries.

7Safe

7Safe

7Safe has been delivering hands-on digital security training courses since 2001 and offer e a portfolio of university and industry-accredited courses.

Oxford BioChronometrics

Oxford BioChronometrics

By building profiles based on electronically Defined Natural Attributes, or e-DNA, Oxford BioChronometrics protects digital networks, communities, individuals and other online assets from fraud.

Hysolate

Hysolate

Hysolate has transformed the endpoint, making it the secure and productive environment it was meant to be.

Rublon

Rublon

Rublon protects endpoints, networks and applications by providing trusted access via two-factor authentication (2FA).

CyberSecurity Non-Profit (CSNP)

CyberSecurity Non-Profit (CSNP)

CyberSecurity Non-Profit (CSNP) is a 501(c)(3) non-profit organization dedicated to promoting cybersecurity awareness and education.

CHEQ

CHEQ

CHEQ provides fully autonomous, preemptive technology for brand safety and ad-fraud prevention.

Delfigo Security

Delfigo Security

Delfigo Security, a pioneer in intelligent authentication, provides a strong, multi-factor authentication solution to prevent identity theft and reduce fraud.

spriteCloud

spriteCloud

spriteCloud is an independent software testing, test automation and cybersecurity services provider.

Data Storage Corp (DSC)

Data Storage Corp (DSC)

Data Storage Corporation is a provider of data recovery and business continuity services that help organizations protect their data, minimize downtime and recover and restore data.

National Cyber Coordination & Command Centre (NC4) - Malaysia

National Cyber Coordination & Command Centre (NC4) - Malaysia

NC4 is established as a center for dealing with cyber threats and crisis at the national level in Malaysia.

Cybervergent

Cybervergent

Cybervergent (formerly Infoprive) are a leading cybersecurity technology company in Africa. We provide cybersecurity guidance and solutions that help protect your business.

Alchemy Security Consulting

Alchemy Security Consulting

Alchemy Security Consulting specialise in offensive and defensive cyber security. We find the weak link in your security so you can patch it up fast and avoid being hacked.

US Cyber Games

US Cyber Games

US Cyber Games is committed to inform and inspire the broader community on ways to develop tomorrow’s cybersecurity workforce.

Slide

Slide

Slide is a modern, security-first Business Continuity & Disaster Recovery (BCDR) company built exclusively for Managed Service Providers.

Soteria Communications

Soteria Communications

Soteria Communications supports clients to prepare for and manage crises, with a focus on cyber incidents.