News

2018-08-20

Malware – The Hateful Eight

Thesaurus Part 2: This concise malware bestiary will help you get your malware terms right when you hang out with the experts.

2018-08-17

Blackmail Emails Demand Bitcoin Payment

The sender threatens that if you do not pay $1000 in Bitcoin within one day then compromising video will be sent to all of your contacts.

2018-08-17

Internet of Things For Healthcare

Healthcare providers and device makers are all looking to the IoT to revolutionise the gathering of healthcare data and the delivery of care itself.

2018-08-16

Hacking Your Holiday: Cyber Criminals Target Tourism

Last year there were 3.9 billion malicious login attempts on sites belonging to airlines, cruise lines, hotels, travel, car rental & transport organisations.

2018-08-16

GMail Users Warned Of Vulnerability

Confidential Mode: GMail users have been alerted about a new Google Mail feature which can be exploited to carry out a wave of scams.

2018-08-15

Cybersecurity In Self-Driving Cars

There are a broad range of cybersecurity challenges that must be overcome before autonomous and connected vehicles can be widely adopted.

2018-08-15

Law Firms Are Uneducated & Exposed

Law firms often spend far less on cyber insurance than they need to have adequate protection, placing themselves at serious consequential risk.

2018-08-14

Bots & Ballots Make A Sophisticated Threat

Russian efforts to undermine the Democratic 2016 Presidential Campaign appear to have been more complex and extensive than first thought.

2018-07-31

COSCO Cyber Attack And The Importance Of Maritime Cybersecurity

COSCO shipping has been at the receiving end of a cyber attack that saw its operations being hit across the world.

2018-07-30

Facebook Loses $123 Billion In Value

It seems the social media giant's previously inexorable market growth and its euphoric market valuation are both at the point of stalling.

2018-08-14

Five Eyes Spies Turn To Commercial Innovation

The 'Five Eye' countries are starting to consider leveraging the commercial technology sector to address common national security concerns.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Satisnet

Satisnet

Satisnet is a leading Security Reseller, Managed Security Services Provider (MSSP) and Cyber Training Innovator, with operations throughout the UK, EMEA and United States.

RCMP Cybercrime Strategy

RCMP Cybercrime Strategy

The RCMP Cybercrime Strategy sets out in an Operational Framework and Action Plan to combat cybercrime.

Resilient Information Systems Security (RISS)

Resilient Information Systems Security (RISS)

RISS is a research group is in the Department of Computing at Imperial College London.

Commissum

Commissum

Commissum specialise in information assurance and security testing services.

RKH Specialty

RKH Specialty

RKH Specialty, part of the Hyperion Insurance Group, is a provider of specialty insurance services including Cyber Risk cover.

Secure Decisions

Secure Decisions

Secure Decisions focus on research and product development related to national security including information assurance, computer network defense, cyber security education, and application security.

XPO IT Services

XPO IT Services

XPO IT Services are dedicated to providing secure, high quality IT recycling and asset disposal services.

Huntress Labs

Huntress Labs

Huntress provides managed threat detection and response services to uncover and address malicious footholds that slip past your preventive defenses.

HackControl

HackControl

HackControl services include penetration tests, security audits, block chain audits and brand and anti-phishing protection.

DataViper

DataViper

DataViper is a threat intelligence platform designed for organizations, investigators, and law enforcement.

Acreto

Acreto

Acreto is an end-to-end security infrastructure that protects all your technologies with a single, simple cloud service.

Ermetic

Ermetic

Ermetic’s identity-first cloud infrastructure security platform provides holistic, multi-cloud protection in an easy-to-deploy SaaS solution.

Goldilock

Goldilock

Goldilock is redefining how sensitive data, devices, networks and critical infrastructure can be secured.

Salus Cyber

Salus Cyber

Salus is a provider of world-class cyber security services, enabling our clients to identify and manage their cyber risks proactively and effectively.

Flawnter

Flawnter

Flawnter is a security testing software that finds hidden security and quality flaws in your applications.

ARC Risk and Compliance

ARC Risk and Compliance

ARC Risk and Compliance is a consulting company comprised of a team of AML Specialists completely focused on anti-money laundering compliance and the technologies used to support compliance programs.