News

2018-06-01

Countering Electoral Interference

Russia’s campaign targeting the 2016 US election shows the how deeply democratic processes can be undermined using communications technology.

2018-05-31

FBI Seizes Control Of Russian Botnet

FBI agents have seized control of a key server in the Kremlin’s global botnet of 500,000 hacked routers, allowing the victims to be identified.

2018-05-30

GDPR - More People Will Share Data

One effect of GDPR will be to increase consumer confidence, making users more likely to share personal data with organisations they trust.

2018-05-30

Denmark Under Attack

Two out of three businesses surveyed have been on the receiving end of cyber-attacks in the last year, with one in eight of those attacks successful.

2018-05-30

A Cyber Attack Could Cripple The UK

The chief of British military intelligence makes a rare public statement warning of the UK's vulnerability to a major cyber attack.

2018-05-30

Mexican Bank Hack Led To A Cash Flight

Several Mexican banks have experienced large cash withdrawals after possible cyber attackers infiltrated the central bank payments system.

2018-05-29

Is The US Heading Toward A Cashless Economy Via Blockchain?

The banking industry is starting to believe it's only a matter of time before central banks adopt a form of digital currency that looks like Bitcoin.

2018-05-29

Business Cyber Security Strategy

The Corporate Board is ultimately accountable for the protection of corporate systems and they need to develop a robust cyber security policy. (£)

2018-05-29

Business Cyber Security Strategy

The Corporate Board is ultimately accountable for the protection of corporate systems and they need to develop a robust cyber security policy.

2018-05-29

Europe Is A Cybercrime Hub

Europe needs businesses to invest in innovative, real-time security capabilities that are robust enough to withstand intense attacks.

2018-05-29

Ecuador Spied On Assange

Trust: Whilst taking refuge in the London Embassy, Assange hacked his hosts network secrets, even although they had him under covert surveillance.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Phoenix TS

Phoenix TS

Phoenix TS offers world-class management, computer, and IT security certification training courses.

Tufin

Tufin

Tufin enables organizations to automate their security policy visibility, risk management, provisioning and compliance across their multi-vendor, hybrid environment.

United Security Providers

United Security Providers

United Security Providers is a leading specialist in information security, protecting IT infrastructures and applications for companies with high demands on security.

High Wire Networks

High Wire Networks

High Wire Network’s Overwatch Managed Security Plaform-as-a-Service offers organizations end-to-end protection for networks, data, endpoints and users.

TrustMAPP

TrustMAPP

TrustMAPP automates cybersecurity & privacy assessments, with universal workflow, allowing teams to generate analytics and recommendations to align priorities for improvement.

Cyphere

Cyphere

Cyphere is a cyber security company that helps to secure most prized assets of a business. We provide technical risk assessment (pen testing/ethical hacking) and managed security services.

Isovalent

Isovalent

Isovalent deliver the most advanced Kubernetes networking & security capabilities to the most demanding of enterprise users.

LiveAction

LiveAction

LiveAction provides end-to-end visibility of network and application performance from a single pane of glass.

US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber Command is responsible for Navy information network operations, offensive and defensive cyberspace operations, space operations and signals intelligence.

Valarian

Valarian

Valarian (formerly Worldr) is on a mission to build cutting-edge solutions that empower borderless collaboration in the new era of digital sovereignty.

Anonomatic

Anonomatic

Anonomatic’s mission is to make data privacy secure, simple and cost effective. We are Data and Privacy Experts who are passionate about helping organizations solve PII compliance.

Securance Consulting

Securance Consulting

Since 2002, Securance has empowered enterprises to assume proactive security, compliance, and risk management strategies.

Imprivata

Imprivata

Imprivata is the digital identity company for life- and mission-critical industries, redefining how organizations solve complex workflow, security, and compliance challenges.

Cenobe Cyber Security

Cenobe Cyber Security

Cenobe provides customized solutions to keep you ahead of potential threats and ensure the security of your organization's systems and data.

StepSecurity

StepSecurity

StepSecurity provides a comprehensive security platform for GitHub Actions.

Custocy

Custocy

Custocy is a unique collaborative AI technology that identifies sophisticated and unknown (zero-day) attacks.