News

2018-01-15

A Plausible Domestic Hack To Beware Of

New hacking methods are replacing some well established crimes like domestic burglary and face -to -face fraud. Don't become a victim.

2018-01-12

Healthcare Organisations In The Cloud

Healthcare data is among the most valuable commodities sought by hackers; healthcare organisations migrating the the Cloud must take care.

2018-01-11

A Cyberattack Could Lead To A Nuclear Strike

There are vulnerabilities to nuclear weapons systems exploitable through the use of malware & viruses, which could leave them open to harmful attack.

2018-01-11

Smartphone Password Vulnerability Discovered

The sensors that make your mobile device smart can also render it vulnerable.

2018-01-11

GDPR Requirements, Deadlines And Facts

Non-compliance could be very costly. Here is what every company that does business in Europe needs to know about GDPR.

2018-01-09

Artificial Intelligence, Automation & Drones (£)

This report examines the expected impact of AI-driven automation on the economy, the benefits of AI and the specific use of Drone Technology.

2018-01-10

Pentagon Seeks Laser-Powered Bat Drones

Flying robots that move like living animals, crafted of next-generation materials that draw their power from energy beamed from nearby aircraft.

2018-01-10

GCHQ Doubles Down On Cyber Weapons

As the threat of escalating cyber warfare looms, GCHQ has revealed the extent to which it has armed the UK with offensive cyber capabilities.

2018-01-10

Retaliation Against N Korea For WannaCry

The US and British governments appear to be preparing a cyber offensive against N. Korea in payback for the damaging Wannacry attack.

2018-01-09

Canada’s Electronic Spies Unleashed

Sweeping new powers are proposed to enable Canada's security establishment to eavesdrop and launch offensive operations. Not everyone is happy.

2018-01-08

GDPR Compliance & Personal Data Protection

GDPR is a fantastic opportunity to get your in-house policies, systems & technologies into shape, demonstrating compliance inside the deadline.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Pluralsight

Pluralsight

Pluralsight helps enterprises build technology skills at scale with expert-authored courses on today’s most important technologies including information and cyber security.

Asigra

Asigra

Asigra provides an industry leading cloud backup and recovery software platform called Asigra Cloud Backup.

CERT-UG/CC

CERT-UG/CC

CERT-UG/CC is the national Computer Emergency Response Team for Uganda, operating under the National Information Technology Authority (NITA-U)

Cyscale

Cyscale

Cyscale automates the contextual analysis of cloud misconfigurations, vulnerabilities, access, and data, to provide an accurate and actionable assessment of risk.

Cyber Physical Security Research Center (CPSEC)

Cyber Physical Security Research Center (CPSEC)

CPSEC aims to contribute to the security enhancement of industrial infrastructure that creates value across cyber space and physical space.

Blockchain Research Institute (BRI)

Blockchain Research Institute (BRI)

Blockchain Research Institute (BRI) is an independent, global think-tank. We bring together the world’s top global researchers to undertake ground-breaking research on blockchain technology.

NDK InfoSec

NDK InfoSec

NDK InfoSec is a specialist Information Security and Cyber Security search firm. We're not just a security function in a larger generalist recruitment company.

Cysiv

Cysiv

Cysiv SOC-as-a-Service combines all the elements of an advanced, proactive, threat hunting SOC, with a managed security stack for hybrid cloud, network, and endpoint security.

Visium Technologies

Visium Technologies

Visium Analytics provides innovative data visualization, cybersecurity technologies and solutions to businesses to protect and secure their data assets.

Audea

Audea

Audea is a consultancy firm specialising in cybersecurity, risk and compliance. We provide professional services addressing all areas of Cybersecurity and GRC.

AnyTech365

AnyTech365

AnyTech365 is a leading European IT Security and Support company helping end users and small businesses have a worry-free experience with all things tech.

Zyston

Zyston

Zyston's solutions provide end-to-end management of your cybersecurity needs. Our range of services help protect your business where it needs it the most.

Sprocket Security

Sprocket Security

Sprocket Security protects your business by monitoring the cybersecurity landscape and performing continuous penetration testing services.

Fusion5

Fusion5

Fusion5 is a leading ANZ Business Services and IT Solutions provider. Our customers trust us to make their potential reality by providing advisory, IT project deployment, and managed services.

Digital Technologies Group (DTG)

Digital Technologies Group (DTG)

DTG are a digital transformation company helping process organisations embrace smarter manufacturing through the adoption of industry 4.0 technologies and solutions.

Axoflow

Axoflow

Axoflow helps organizations to consolidate their existing solutions for logs, metrics, and traces, and evolve them into a cloud native observability infrastructure.