News

2017-10-30

Iran Responsible For Cyber Attack On British Parliament

A sustained attack that compromised over 90 MPs Email accounts is thought to be Iran’s first act of cyberwarfare against Britain.

2017-10-31

Microsoft Chief Says N. Korea Was Behind 'WannaCry'

Brad Smith confirms N. Korea was behind the devastating WannaCry ransomware attack that temporarily crippled UK Healthcare organisations.

2017-10-31

Israeli Spies Hacked Kaspersky

Israeli agents hacked Kaspersky to provide the crucial evidence to ban the cybersecurity company from supplying the US government.

2017-11-13

AI Can Guess Your Password

A new application of artificial intelligence & deep learning in information security focuses on more efficiently guessing passwords. It seems to work.

2017-11-02

Insurance Will Reduce Cyber Losses

The increasingly serious and large-scale nature of cyberattacks is creating problems for companies and clients of all sizes and on all levels.

2017-11-10

Russian Hacking Fuels Return To Paper Ballots

US regional election authorities are thinking of reversing the trend towards vulnerable electronic systems.

2017-10-24

News E-models For Quality Journalism

Wikipedia founder Jimmy Wales is embarking on a new online venture that the rest of us can only hope succeeds: Creating a new business model for quality journalism.

2017-11-06

Criminalised: Watching Terrorist Propaganda Online

Watching streamed extremist material online will be a criminal offence in Britain in plans to crackdown on terrorist propaganda.

2017-11-02

Phishing Is The Top Cyberattack Vector In 2017

Of all attack vectors, phishing remains the most commonly exploited, and accounts for 90% to 95% of all successful cyberattacks worldwide.

2017-11-02

Social Media & 21st-Century Warfare

Russia’s use of social media to influence the US elections demonstrates how warfare has moved away from the battlefield and toward the Internet.

2017-10-24

Cyber Criminals Threaten DDoS Attacks

… And email demands payment or criminals will take companies and their websites offline

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

European Cybercrime Training and Education Group (ECTEG)

European Cybercrime Training and Education Group (ECTEG)

The primary aim of ECTEG is to enhance the coordination of cybercrime training, by identifying opportunities to build the capacity of countries to combat cybercrime

Cofense

Cofense

Cofense (formerly PhishMe) is a leading provider of human-driven phishing defense solutions.

TCDI

TCDI

TCDI specializes in computer forensics, eDiscovery and cybersecurity services.

G DATA CyberDefense

G DATA CyberDefense

G Data developed the world's first antivirus software. We now ensure the security of small, large and medium-sized companies all over the world.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

RedShield Security

RedShield Security

RedShield is the world's first web application shielding-with-a-service company.

Morphus Information Security

Morphus Information Security

Morphus is an information security company providing Red Team, Blue Team and GRC services as well as conducting research in cybersecurity and threat analysis.

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions provides advanced, innovative data security solutions for enterprises, professionals and individuals.

HOBI International

HOBI International

HOBI International is a leading mobile, IT and data center asset management provider with solutions for device management, reverse logistics, data erasure, refurbishment and recycling.

Logically.ai

Logically.ai

Logically combines artificial intelligence with expert analysts to tackle harmful and manipulative content at speed and scale.

ThreatFabric

ThreatFabric

ThreatFabric integrates industry-leading threat intel, behavioral analytics, advanced device fingerprinting and over 10.000 adaptive fraud indicators.

Summit 7 (S7)

Summit 7 (S7)

Summit 7 is a national leader in cybersecurity, compliance, and managed services for the Aerospace and Defense industry and corporate enterprises.

Xact IT Solutions

Xact IT Solutions

Xact IT Solutions are a certified cybersecurity firm offering cybersecurity, compliance and managed services.

Afripol

Afripol

AFRIPOL was set up to strengthen cooperation between the police agencies of AU member states in the prevention and fight against organized transnational crime, terrorism, and cybercrime.

Forward Networks

Forward Networks

Forward Networks - transforming networks to be more reliable, agile, and secure.

Coalition for Secure AI (CoSAI)

Coalition for Secure AI (CoSAI)

CoSAI is an open ecosystem of AI and security experts from industry leading organizations dedicated to sharing best practices for secure AI deployment and collaborating on AI security research.