News

2019-04-09

FBI Takes Too Long To Alert Victims

Auditors report that FBI agents often drag their feet in notifying victims they’ve been breached, leaving networks unnecessarily vulnerable.

2019-07-14

Cyber Knowledge The Easy Way

A new book by acclaimed cyber security expert Alfred Rolington explores the 4th Industrial Revolution, its impact on society and the economy.

2019-04-08

Financial Apps Are Vulnerable

New research reveals widespread security deficiencies indicating that financial institutions are failing when it comes to protecting their apps.

2019-04-08

The Brexit Shaped Gap In UK Cyber Security

Leaving the EU could mean a whole new cyber security regime for the UK and firms need to understand how the changes might affect them.

2019-04-08

British Politicians Need To Better Understand Cyber Security

As critical public services like transport, energy, and our election process are being digitised, cybersecurity is becoming entwined in politics.

2019-04-05

The UK Needs Data Driven Policing

Electronic social change is putting significant pressure on policing. As criminals go digital, hard-pressed police forces need to follow them.

2019-04-04

Identity Management Fundamentals

Identity management is fundamental to information security. Why is it that so many organizations are terrible at it? By Evan Francen

2019-04-08

The EU’s Copyright Directive Risks Creating Two Internets

The EU Parliament’s approval of the Copyright Directive creates substantial new controls on what can be shared online. That's a problem.

2019-04-03

Five Tech Trends Driving Cyber Security

Cybersecurity is an area where the best interests of business, customers and government need to align. A leading CISO identifies the key issues.

2019-04-03

British Cyber Security Strategy Is ‘Chaotic’

With cyber security responsibilities spread across six different departments, the UK government is coming in for biting criticism from its opponents.

2019-04-03

AI Is The New Route For Both Cyber Attacks And Their Prevention

AI is developing quickly and can be applied to several specific uses in cyber security. How useful is the technology and where can it be applied?

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Sapphire

Sapphire

Sapphire deliver flexible and scalable cybersecurity solutions, helping organisations to detect, protect, respond and remediate against cyber threats.

CEPS

CEPS

CEPS is a leading think tank and forum for debate on EU affairs, ranking among the top think tanks in Europe. Topic areas include Innovation, Digital economy and Cyber-security.

SolarWinds

SolarWinds

SolarWinds as a worldwide leader in solutions for network and IT service management, application performance, and managed services.

CloudCheckr

CloudCheckr

CloudCheckr is a next-gen cloud management platform that unifies Security & Compliance, Inventory & Utilization and Cost Management.

International Accreditation Forum (IAF)

International Accreditation Forum (IAF)

The IAF is the world association of Conformity Assessment Accreditation Bodies. Its primary function is to develop a single worldwide programme of conformity assessment.

DeepSeas

DeepSeas

DeepSeas is the result of a merger between Security On-Demand (SOD) and the commercial Managed Threat Services (MTS) business of Booz Allen Hamilton.

PreCog Security

PreCog Security

PreCog Security is a US based cybersecurity risk mitigation company. We specialize in helping you find, minimize and manage vulnerability risk within your product, network and process.

SAM Seamless Network

SAM Seamless Network

SAM Seamless Network is a cybersecurity technology platform that protects the connected home, by tackling cyber security threats at the source.

Wabbi

Wabbi

Wabbi’s continuous security platform centralizes, automates and orchestrates security governance and vulnerability management to empower development teams to own appsec.

SensCy

SensCy

SensCy is a Trusted Guide for Sensible Cybersecurity for small and medium-sized organizations.

LogicMonitor

LogicMonitor

LogicMonitor provides SaaS-based IT infrastructure monitoring services for on-premises and multi-cloud environments.

Galvanick

Galvanick

Galvanick enables your operations and IT teams to protect your industrial systems and networks against digital threats.

Bastazo

Bastazo

Bastazo provides tools for vulnerability and patch management. Focus your cybersecurity operations on vulnerabilities with the highest risk of exploitation.

Allstate Identity Protection

Allstate Identity Protection

Allstate make it easy to provide complete identity protection, so everyone can live more confidently online.

TerraEagle

TerraEagle

Terraeagle is a boutique cyber security services company providing tailor-made solutions. Our core competency is in SOCaaS, MDRaaS & and Incident Response Retainer Services.

Cyberdise

Cyberdise

Cyberdise is an AI-driven cybersecurity awareness solution designed for companies with complex security requirements.