News

2018-02-13

The Distorted Reality Of Algorithms

Algorithms can distort the truth, as demonstrated by the shocking chain of events following a 'YouTube celebrity' finding a dead body.

2018-02-13

Cyber Attackers Will Soon Kill Somebody

British spy chief says it is only a matter of time before a cyber attack on Britain results in deaths.

2018-02-12

How GDPR Affects Your Marketing Strategy

GDPR has a very big impact for marketing professionals. The experts at GDPR Advisory Board have straightforward advice for them.

2018-02-12

Nation State Hacking Is On Trend In 2018

In 2017 attackers working for nation-states focused on efficiency and return on investment, and were very successful. This trend will only get bigger.

2018-02-12

What Does Brexit Mean For Britain's Spies?

As the UK negotiates Brexit, two former intelligence chiefs warn that Britain's security expertise should not become a "bargaining chip".

2018-02-12

Hackers Strike Winter Olympics

N. Korea's participation in a joint national team with S. Korea has not prevented multiple attacks on the Pyeongchang Olympics.

2018-02-09

NHS Trusts Failed Cyber Security Assessment

Every single one of the 200 British NHS trusts so far assessed for cyber security resilience has failed an onsite assessment.

2018-02-09

Cybersecurity Salaries 7% Up In 2018

Good Times: Salaries for cybersecurity specialists are set to rise by 7% this year, the highest wage raise among IT professionals.

2018-02-09

Infraud Cybercrime Site: Dozens Arrested

A premier online destination for the purchase and sale of stolen property worth $500m and using the slogan "In Fraud We Trust" has been taken down.

2018-02-08

Business Cybersecurity Strategy

While 93% of businesses surveyed regard it as important, only 56% have established a formal cybersecurity strategy. That is a taking a huge risk.

2018-02-08

The GDPR Deadline Is Near & Business Is Not Ready

25th May 2018: Under half of businesses are aware of the forthcoming data protection laws they'll be subject to in just four months' time.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Cloud Credential Council (CCC)

Cloud Credential Council (CCC)

The CCC is a leading provider of vendor-neutral certification programs that empower IT and business professionals in their digital transformation journey.

Information Commissioner's Office (ICO)

Information Commissioner's Office (ICO)

The Information Commissioner's Office is an independent authority set up to uphold information rights in the public interest.

Homeland Security Advanced Research Projects Agency (HSARPA)

Homeland Security Advanced Research Projects Agency (HSARPA)

HSARPA's Cyber Security Division (CSD) was set up to address DHS cyber operational and critical infrastructure protection requirements.

Zix

Zix

Zix offers secure email encryption, threat protection, archiving, DLP and BYOD security for hospitals, financial services, government, and more.

Arcanum Information Security (AIS)

Arcanum Information Security (AIS)

Arcanum Information Security is a specialist Information Assurance Consultancy and a leading provider of Cyber Security services to UK Defence, UK Government, Enterprise businesses and SMEs.

IDnow

IDnow

IDnow is the world’s fastest, most flexible and most secure identity verification platform, delivering instant verification of the identity documents used by 7 billion people.

AVeS Cyber Security

AVeS Cyber Security

AVeS combines expert knowledge and services with leading technology products to provide comprehensive Information Security and Advanced IT Infrastructure solutions.

Echosec Systems

Echosec Systems

Echosec Systems is a data discovery company delivering social media and dark web threat intelligence. Our web based security software delivers critical information for situational awareness.

Darkbeam

Darkbeam

Darkbeam provides a unified solution to protect against security, brand and compliance risks across your digital infrastructure.

Lockheed Martin

Lockheed Martin

Lockheed Martin deliver full-spectrum cyber capabilities and cyber resilient systems to defense, intelligence community and global security customers.

1898 & Co

1898 & Co

Keep your critical assets secure with a comprehensive portfolio of services from high-level assessments to fully managed security services designed for operational technology applications.

AVEVA

AVEVA

AVEVA has a long history in providing Supervisory Control and Data Acquisition software for meeting complex and evolving automation requirements.

Mobilicom

Mobilicom

Mobilicom is an end-to-end provider of cybersecurity and smart solutions for drones, robotics & autonomous platforms.

Unciphered

Unciphered

Unciphered was created as the first company providing services for opening locked hardware cryptocurrency wallets.

Emerge Digital

Emerge Digital

Emerge Digital is a technology and digital innovation business and Managed Services Provider providing solutions to SMEs.

Pontiro

Pontiro

At Pontiro, we are enabling a new era of data-sharing. Bridging the gap between protected data and valuable insights through the use of cutting edge Homomorphic Encryption.