News

2018-04-18

What Does GDPR Mean For the Retail Industry?

Retailers collect masses of personal data from customers/client emails and payment details. All shortly to be subject to GDPR. By Alfred Rolington

2018-04-18

Human vs Machine Attack Response

Machine automation gives attackers the ability to quickly scale up attacks far beyond human capacity. But automation has its limits.

2018-04-17

Death by Robot

As the use of autonomous machines increases in society, so too has the chance of robot-related fatalities.

2018-04-02

Cambridge Analytica Used ProtonMail To Hide Email Paper Trails

Controversial data firm Cambridge Analytica used a “secure, secret email system” for correspondence between the company and third parties.

2018-04-02

Julian Assange Has Internet Connection Cut

Ecuador has cut asylum seeker Julian Assange's Internet connection at its London embassy to prevent him 'interfering in other countries' affairs'.

2018-04-17

The US Power Grid Needs Better Security

Most Americans think the US government is not doing enough to protect the electric grid from cyber attacks.Their fears appear to be justified.

2018-04-16

Snowden: The Deep State’s Influence On The Presidency

It is 5 years since rogue NSA contractor fled to Moscow where, safe from prosecution, he reflects on the corrupting power of secrecy.

2018-04-16

Australia’s Cybersecurity Adviser Calls For Privacy

Australia's national cybersecurity adviser has urged social media companies to improve the way they treat personal data.

2018-04-16

The Pentagon Is Busy Integrating Cyber Into Its Battle Plans

US Cyber Command is emerging as a unified combat command, integrating cyber planning and effects into traditional military operations.

2018-04-13

Cyber Criminals Have Ingenious Money Laundering Methods

Cyber criminals are using a combination of cryptocurrencies, gaming currencies and micro-payments to launder $200bn of stolen money.

2018-04-13

How to Improve Cyber Security Awareness In Your Organisation

CIOs can help combat the ever-evolving threats occurring in the workplace by highlighting security issues and raising overall awareness.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Pondurance

Pondurance

Pondurance is an IT Security and Compliance company providing services in Cyber Security, Continuity, Compliance and Threat Management.

Octopus Cybercrime Community

Octopus Cybercrime Community

The Octopus Community is a platform for information sharing and cooperation on cybercrime and electronic evidence.

Pindrop Security

Pindrop Security

Pindrop solutions are leading the way to the future of voice by establishing the standard for security, identity, and trust for every voice interaction.

Bechtel

Bechtel

Bechtel’s Industrial Control Systems Cyber Security Laboratory focuses on protecting large-scale industrial and infrastructure systems that support critical infrastructure.

Tempest

Tempest

TEMPEST is a leading provider of IT products and services including solutions for network and application security.

Conduent

Conduent

Conduent delivers mission-critical technology services and solutions on behalf of businesses and governments. Solution areas include digital risk and compliance.

Have I Been Pwned (HIBP)

Have I Been Pwned (HIBP)

Have I Been Pwned is a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or "pwned" in a data breach.

Corsica Technologies

Corsica Technologies

Corsica Technologies is recognized as one of the top managed IT and cybersecurity service providers. Our integrated IT and cybersecurity services protect companies and enable them to succeed.

Cyber Security Works (CSW)

Cyber Security Works (CSW)

Cyber Security Works is your organization’s early cybersecurity warning system to help prevent attacks before they happen.

Network Perception

Network Perception

Network Perception proactively and continuously assures the security of critical OT assets with intuitive network segmentation verification and visualization.

Wabbi

Wabbi

Wabbi’s continuous security platform centralizes, automates and orchestrates security governance and vulnerability management to empower development teams to own appsec.

Prancer

Prancer

Prancer is the industry's first cloud-native, self-service SAAS platform for automated security validation and penetration testing in the cloud.

Judy Security

Judy Security

Judy (formerly AaDya Security) provides smart, simple, effective, all-in-one cybersecurity for SMBs. Get the 24/7 protection and support you deserve, at a price you can afford.

Spirit Technology Solutions

Spirit Technology Solutions

Spirit Technology Solutions is a modern workplace services provider committed to delivering solutions that embody our core principles of security, sustainability, and scalability.

Superna

Superna

Superna is the global leader in data security and cyberstorage solutions for unstructured data, both on-prem and in the hybrid multi-cloud.

Trium Cyber

Trium Cyber

Trium Cyber - Expert Cyber Underwriting and Claims Management. Based in the US and UK. Backed by Lloyd’s of London.