News

2018-06-01

Digital Shock (£)

The 4th Industrial Revolution will create an integration of digital, physical and biological systems that will significantly change our world. (£)

2018-06-05

Cybercrime: Law Enforcement Must Get Serious

A crime is crime, whether the bad actor is throwing a brick or wielding a keypad. Police should treat online crimes and physical crimes the same.

2018-06-05

Playing Catch-Up With GDPR

Beyond the EU the GDPR regulation is expected to reshape how global organisations manage, share and protect their users’ personal data.

2018-06-05

Demand For Indian Cybersecurity Skills Rising Fast

A side effect of GDPR is to promote a surge in demand for cybersecurity skills in outsourced IT centres in India.

2018-06-04

Malta Under Large Scale Attack

As a well known offshore banking centre for Russian nationals, it is perhaps no surprise that Malta suffers a high number of cyber attacks.

2018-06-04

Action Fraud Reports A Sharp Rise In Fake TSB Activity

The UK online crime reporting service is seeing a big jump in suspicious messaging connected with the stricken customer IT systems of TSB Bank.

2018-06-04

Nation State Cyber Attacks Are An Act Of War

Top British law officer thinks hostile states targeting essential infrastructure & services should be treated in the same way as physical attackers.

2018-06-04

GDPR Is Now Effective

GDPR is a wake-up call for American companies to solidify best practices around their big data and data science initiatives.

2018-06-04

Japan’s Secret Spy Agency

Like any other advanced economic power, Japan operates a significant intelligence and surveillance apparatus. Here is an outline.

2018-06-01

N Korean Cyber Attacks Continue Despite Peace Talks

Experts see an intensification in the level of cyber attacks from N Korea in the build up to talks with S Korea and the US on de-nuclearisation.

2018-05-31

Quantum Computing - What You Should Know

As conventional computing technology matures and with an insatiable demand for more power, there is a growing interest in quantum computing.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ProPay

ProPay

ProPay provides secure payment solutions for organizations ranging from small businesses to large enterprises requiring complex payment solutions.

Cybellum

Cybellum

Cybellum brings the entire product security workflow into one dedicated platform, allowing device manufacturers to keep the connected products they build cyber-secure and cyber-compliant.

Digittrade

Digittrade

Digittrade develop and produce external encrypted hard disks and secure communications apps.

ResponSight

ResponSight

ResponSight is a data science company focusing specifically on the challenge of measuring risk and identifying changes in enterprise/corporate networks using behavioural analytics.

Nova Leah

Nova Leah

Nova Leah helps connected medical device manufacturers meet cybersecurity compliance requirements throughout the entire product lifecycle.

BotRx

BotRx

BotRx is the only AI-enabled, automated fraud protection technology that allows fast & easy deployment - continually keeping invisible bad bots and agents at bay, so you can rest easy.

SAP National Security Services (NS2)

SAP National Security Services (NS2)

SAP NS2 are dedicated to delivering the best of SAP innovation, from cloud to predictive analytics; machine learning to data fusion.

DataEndure

DataEndure

DataEndure helps companies build digital resilience so that their critical information assets are protected and available to the right people, at the right time.

AirEye

AirEye

AirEye is a leader in Network Airspace Protection (NAP). Block attacks against your corporate network launched from wireless devices in your corporate network airspace.

CYMOTIVE Technologies

CYMOTIVE Technologies

Combining Israeli cyber innovation with a century of German automotive engineering. CYMOTIVE operates under the assumption that connectivity is a game changer for the automotive industry.

Airtel Secure

Airtel Secure

Airtel Secure’s multi-layered, full service cybersecurity offerings are designed to safeguard enterprises against threats of various kinds and origins.

DESCERT

DESCERT

DESCERT offers you an extended IT, cyber security, risk advisory & compliance audit team which provides strategic guidance, engineering and audit services.

Infisign

Infisign

Infisign addresses the challenges of traditional IAM systems and offers a comprehensive solution for modern identity management.

Foghorn Consulting

Foghorn Consulting

Foghorn can analyze your cloud to enhance performance and security, while reducing costs. Based on AWS’ 6 Pillars, our AWS WAFR Certified Engineers Will Identify Areas of Improvement.

TENEX

TENEX

TENEX is a cybersecurity company leveraging advanced artificial intelligence and human expertise to transform enterprise security.

CQR

CQR

CQR are at the forefront of innovative cyber solutions, dedicated to securing and fortifying Operational technology (OT) infrastructure.