News

2017-12-27

Very Few Women Are CISOs

A good CISO is hard to find especially in the case of female executives, who hold only 13% of these vital roles in top companies.

2017-12-22

US Defense Contractors Stole Images From UK Secret Surveillance Station

In a major embarrassment to US & UK military authorities, architects disclosed top secret images of the RAF Croughton SIGINT interception centre.

2017-12-22

Ethiopian Cyber Spies Left Clues Behind

The Ethiopian government used spyware acquired from an Israeli company to spy on dissidents. Unfortunately, they didn't read the instructions.

2017-12-21

Directors Who Conceal Cyber Attacks Could Face Prison

If you think GDPR compliance is a challenge for EU businesses, the proposed US Data Security & Breach Notification Act will really scare you.

2017-12-21

Why Is The Price Of Bitcoin So High?

Some think the rise is happening because of market manipulation.Others think the real value of Bitcoin is not driven by price but by its utility.

2017-12-21

Get Into Gear On GDPR

The introduction of the General Data Protection Regulation (GDPR) in May 2018 represents a watershed moment for data regulation. Get ready.

2017-12-20

Russian Hackers Steal $10M From Banks

The MoneyTaker group broke into 20 systems, which includes 15 US lenders, targeting ATMs and Russia’s interbank money-transfer system.

2017-12-20

Digital Risks Are Changing And CSOs Must Adapt

CSOs must expand their reach to not only monitor tangible risks, but also address the uninsured risks that live in the digital world.

2017-12-19

Google To Open An AI Centre In Beijing

Google's search engine is blocked in China, yet both have ambitions to become AI superpowers and that's enough to overcome their differences.

2017-12-19

The Current Threat Of Global Cyber Warfare

Government and corporate cyber resources are under attack around the globe. Cyber warfare is a real threat and it is happening now.

2017-12-19

96 Hours To Pay Up Or Spider Ransomware Deletes Your Files

To avoid the Spider Virus Windows users should be cautious of encrypted documents that contain a message enabling macros.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Blue Solutions

Blue Solutions

Blue Solutions is a consultancy-led, accredited software distributor who provides IT solutions and support to small and medium enterprises.

Synology

Synology

Synology provides high-performance, reliable, and secure Network Attached Storage (NAS) products.

CERT-UG/CC

CERT-UG/CC

CERT-UG/CC is the national Computer Emergency Response Team for Uganda, operating under the National Information Technology Authority (NITA-U)

Karlsruhe Institute of Technology (KIT)

Karlsruhe Institute of Technology (KIT)

KIT is a leading research and education institutions with strong capabilities in information systems and security.

Hitachi Systems Security

Hitachi Systems Security

Hitachi Systems Security provides customized services for monitoring and protecting the most critical and sensitive IT assets in our clients’ infrastructures 24/7.

InnoSec

InnoSec

InnoSec is a software manufacturer of cyber risk management technology.

Volatility Foundation

Volatility Foundation

Volatility is an open source memory forensics framework for incident response and malware analysis.

Arm

Arm

Arm technology is building the future of computing. We architect, develop, and license high-performance, low-cost, and energy-efficient IP solutions for CPUs, GPUs, NPUs and interconnect technologies.

Archivo

Archivo

Archivo is a value added reseller focused on Disaster Recovery as a Service (DRaaS), backup, hyper-convergence, hybrid storage and Cyber security.

Stratus Cyber

Stratus Cyber

Stratus Cyber is a premier Cyber Security company specializing in Managed Security Services. Our services include Blockchain Security, Pentesting, and Compliance Assessments.

SimSpace

SimSpace

SimSpace is the visionary yet practical platform for measuring how your security system responds under actual, sustained attack.

Winterhawk

Winterhawk

Winterhawk is a specialist and leading global Cyber, ESG, GRC, Risk & Identity consulting practice.

e-Careers

e-Careers

e-Careers is an edtech institution that provides industry recognised courses and up-skilling solutions to individuals and organisations.

HackersEra

HackersEra

HackersEra is a leading offensive cybersecurity service provider. We enable our clients to operate in a more secure environment efficiently and produce more value.

Papua New Guinea National Cyber Security Centre (PNG NCSC)

Papua New Guinea National Cyber Security Centre (PNG NCSC)

PNG NCSC is a jointly funded initiative enabling PNG to benefit with the most advanced cyber protection of its critical information and communications technology infrastructure.

CyberMindr

CyberMindr

CyberMindr is a SaaS platform for Automated & Continuous Attack Path and Threat Exposure Discovery helps you to proactively identify & assess your attack surface to mitigate associated threats.