News

2018-11-02

Pay-As-You-Go Cybersecurity

Shifting from a monolithic, high investment, capex-based cybersecurity model to an on-demand, pay-as-you-go one is clearly the way of the future.

2018-11-07

Blockchain May Break Tech’s Hold On AI

Hot Money: The idea of applying the blockchain to artificial intelligence is attracting a growing number of serious entrepreneurs and VCs.

2018-11-03

Younger Generation Better At Separating News From Opinion

Gen Z don’t know much about the days of print newspapers separating the news pages from the opinion section. But they can tell the difference.

2018-11-09

USA & China Named As Top Cyber-Attack Sources

Of 27 million attack sources analysed by NSFOCUS in H1 2018, attacks emanating from China, the USA & Russia were predominant.

2018-11-07

Finland Is Worried About Russian Cyberwar Techniques

Falling in the shadow of its giant neighbour means that Finland is being  inevitably drawn into the world of Russian hybrid warfare.

2018-11-12

British Army Gets a New Robot

The British Army has a new ordnance disposal robot with the ability to climb stairs and negotiate slopes of more than 40 deg. to defuse bombs.

2018-11-04

Plans to Create More Cyber Women

Kaspersky Lab has developed new partnerships in an effort to encourage more women to consider careers in the cyber security field.

2018-11-08

How Cybersecurity Threats Are Growing Investments

Viruses, worms, firewalls, Trojans, ransomware: Investors are searching for ways to capitalise on the growth of the cybersecurity sector.

2018-11-02

Cyber Audits: The Missing Layer in Cybersecurity

Involving the audit team ensures that technology solutions are being properly deployed to address critical strategic security risks.

2018-11-01

Machine Learning & Big Data - Where You Least Expect It

Machine Learning has gone from a cryptic domain understood by a few to a technology that every company must deploy. Likewise Big Data.

2018-10-31

North Korea Is Using The Internet Like The Mafia

North Korea has “dramatically” changed its Internet use patterns, as Kim Jong Un directs hacking operations ‘like a Criminal Syndicate’.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Oodrive

Oodrive

Oodrive is the first trusted European collaborative suite allowing users to collaborate, communicate and streamline business with transparent tools that ensure security.

Referentia

Referentia

Referentia leads the development of critical infrastructure solutions that benefit society, including cyber security and network performance management.

Aves Netsec

Aves Netsec

Aves is a deceptive security system for enterprises who want to capture, observe and mitigate bad actors in their internal network.

Simeio Solutions

Simeio Solutions

Simeio is a complete Identity and Access Management (IAM) solution provider that engages securely with anyone, anywhere, anytime.

TI Safe

TI Safe

TI Safe provide cybersecurity solutions for industrial networks of main critical infrastructures in Latin America.

Bluink

Bluink

Bluink specializes in identity and access management and customer identity verification, using your smartphone as a strong authenticator and secure identity store.

Cyber Security Austria (CSA)

Cyber Security Austria (CSA)

Cyber Security Austria (CSA) is an independent non-profit association with the aim to address security issues in the area of IT/cyber security of critical/strategic infrastructures in Austria.

UPX Technologies

UPX Technologies

UPX Technologies is one of the largest digital security centers in Brazil providing full protection for data, networks and content.

CoursesOnline

CoursesOnline

CoursesOnline.co.uk is a database listing IT security courses from providers across the UK.

Accolite Digital

Accolite Digital

Accolite is an innovative, design thinking software company that guarantees seamless digital experiences with maximum results.

Saffron Networks

Saffron Networks

Saffron Networks is an ISO-certified company. We assure our clients of reliable solutions, specifically with the Security landscape and Enterprise Networking.

Lighthouse IT

Lighthouse IT

At Lighthouse IT, we are focused on delivering seamless and reliable services to unlock the value of technology for your business.

Alset Technologies

Alset Technologies

Alset Technologies provides DASH - a comprehensive solution to DISA STIG (Security Technical Implementation Guide) compliance.

Pulsar Security

Pulsar Security

Pulsar Security is a team of highly skilled, offensive cybersecurity professionals with the industry's most esteemed credentials and advanced real-world experience.

Stack Overflow

Stack Overflow

Founded in 2008, Stack Overflow’s public platform is used by nearly everyone who codes to learn, share their knowledge, collaborate, and build their careers.

Secher Security

Secher Security

Secher Security is a professional and secure partner with a high level of professional expertise in simplifying and optimizing complex IT infrastructures.