News

2017-11-30

Where Should The Pentagon Focus In Cyberspace?

Playing Catch-Up: The US military is still working out its tactics, techniques, command structures and procedures for operations in cyberspace.

2017-11-24

US Ready To Fight Hybrid War By 2030

The US Army expects lethal attacks in multiple domains, land, sea, air, space and cyberspace, blurring the distinction between peace and war.

2017-11-21

Cyber Security Insurance

It used to be simple …If your employee stole cash from your business or forged a cheque, an insurance policy would cover it. Not any more.

2017-11-20

North Korean Cyber Gangs Blitz the Irish

North Korean state-sponsored cyber gangs are launching almost daily attacks on Irish companies, banks and utilities.

2017-11-28

Social Media & Crisis Management

Social media has the power to connect people instantly. For security managers, it's the most powerful tool for controlling information.

2017-11-15

What Does The UK’s Data Protection Bill Mean For Business?

The UK has published the final version of a law to replace its current data security and privacy rules. What does this mean for business after Brexit?

2017-11-20

Thomson Reuters Create A Knowledge Meta-Graph

A new financial services tool charting over 2 billion connections between people, organisations & metadata within the financial ecosystem.

2017-11-27

Cyber Defense Is All About Political Decisions

One of the things democracies are least prepared to handle about a cyberattack is how quickly the response to it turns in to a political controversy.

2017-11-08

Maritime Cybersecurity: No Substitute for Testing

Preparedness, in the form of testing maritime cybersecurity via different tools to detect potential attacks, is vital for minimizing risks.

2017-11-08

UK Must Prepare For The 4th Industrial Revolution

Advanced digital technology could give UK manufacturing a huge boost and create hundreds of thousands of jobs, a new report claims.

2017-11-27

North Korea Denies Involvement In WannaCry

North Korea has challenged accusations of being behind Wannacry ransomware calling them a “wicked attempt” to tighten sanctions.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cifas

Cifas

Cifas are leaders in fraud prevention, working closely with UK law enforcement partners.

Huntsman Security

Huntsman Security

Huntsman Security provides technology to enable real-time security monitoring and immediate visibility of advanced threats and compliance issues.

LIFARS

LIFARS

LIFARS is a global leader in Digital Forensics and Cyber Resiliency Services.

Armis

Armis

Armis offers the markets leading asset intelligence platform designed to address the new threat landscape that connected devices create.

Bradley-Morris

Bradley-Morris

Bradley-Morris is a leading recruiting firm specializing in transitioning military and veteran talent into civilian careers including Cybersecurity.

SearchInform

SearchInform

SearchInform is a leading risk management product developer, protecting business and government institutions against data theft, harmful human behavior, compliance breaches and incomplete audit.

Sygnia

Sygnia

Sygnia is a cyber technology and services company, providing high-end consulting and incident response support for organizations worldwide.

Schillings

Schillings

Shillings defends your rights to privacy, reuptation and security. We fight passionately against breaches of your privacy, attacks on your reputation and threats to your security.

Resourcive

Resourcive

Resourcive is the first Value Added Sourcing “VAS” consultancy. We deliver strategic IT sourcing solutions to mid-market and enterprise clients.

MS Tech Solutions

MS Tech Solutions

MS Tech Solutions is a Jamaican-based, multinational consulting company that specializes in the architecture, implementation and management of key network and Information technologies.

Kubus Hitam

Kubus Hitam

Kubus Hitam are a research-based company focused on cyber security. we strongly believe that innovation and safety are the two keywords for the future business market.

LOCH Technologies

LOCH Technologies

LOCH Wireless Machine Vision platform delivers next generation cybersecurity, performance monitoring, and cost management for all 5G and for broad-spectrum IoT, IoMT and OT wireless environments.

Reveald

Reveald

Reveald is making Exposure Management a reality to solve the biggest challenges in cybersecurity with a trailblazing ‘offense to defense’ approach that gives the advantage back to the business.

True North Solutions

True North Solutions

True North Solutions provides a wide range of fully customized, vendor-neutral industrial engineering and OT automation solutions to companies across North America and around the world.

Operational Systems (OpSys)

Operational Systems (OpSys)

OpSys is a leading Managed IT and Cyber Security provider protecting the critical elements of businesses across the globe.

Toro Solutions

Toro Solutions

Toro provide managed security & consultancy to keep governments, businesses & society resilient in the space where cyber, physical & people security converge.