News

2017-06-14

UK SMEs Don’t Have Cybersecurity Recovery Plans

With GDPR rules coming into force in less than a year nearly half of UK small businesses don’t have a cyber security plan for their business.

2017-06-14

North Korea, WannaCry, Cyberattacks And Lazarus

Who is really to blame? For many, it seems that question has already been solved: It was North Korea. Except the evidence is not conclusive.

2017-06-13

SMEs And Cyber Insurance

Small and medium businesses rely on partners and they face a growing range of online challenges. Cyber Insurance has a key role to play.

2017-06-13

NATO Could Go To War In Response To A Cyber Attack

A persistent and devastating attack could trigger what is known as Article 5, NATO’s collective defense measure.

2017-06-12

Putin Applauds Patriotic Russian Hackers

Putin: "patriotic" citizens might be engaged in hacking. Such individuals are joining "the justified fight against those speaking ill of Russia,"

2017-06-12

French Security Chief Warns of Permanent Cyber War

France's top cyber spy says there is risk of "permanent war" in cyberspace as a result of hacking for espionage and fraud by states & criminals.

2017-06-09

UK’s Trident Nuclear Subs Vulnerability To Hackers

The Royal Navy Trident submarine fleet is vulnerable to a “catastrophic” cyber attack that could render Britain’s nuclear weapons useless.

2017-06-09

Leaked NSA Report Claims Russian 'Cyber Espionage' Against US Elections

At least one company providing software for the electoral process was targeted and 100 local election officials targeted by spear-phishing emails.

2017-06-09

Islamic State's Social Media Strategy

So called Islamic State is fighting on many fronts and puts media warfare on a par with its battle on the ground.

2017-06-12

Uber In Legal Fight With Google

Uber has fired the engineer accused of stealing secrets from Google after he failed to assist with an investigation related to the lawsuit.

2017-06-09

How To Integrate Threat Intelligence

In a complicated, fast-paced cyber environment, it's difficult to hunt for vulnerabilities. Automating threat intelligence can help you find them.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Intruder

Intruder

Intruder is a cloud-based vulnerability scanner that finds cyber security weaknesses in your digital infrastructure, to avoid costly data breaches.

Executive Women's Forum (EWF)

Executive Women's Forum (EWF)

The Executive Women's Forum is the largest member organization serving emerging leaders and influential female executives in the Information Security, Risk Management and Privacy industries.

Saviynt

Saviynt

Saviynt is a leading provider of Cloud Security and Identity Governance solutions.

Hornetsecurity

Hornetsecurity

Meet Hornetsecurity – Leading Cloud Email Security Provider. We protect global organizations so you can focus on what you do best.

Ensign InfoSecurity

Ensign InfoSecurity

Ensign InfoSecurity is Southeast Asia’s largest pure-play cybersecurity firm.

OneTrust

OneTrust

OneTrust is the largest and most widely used technology platform to operationalize privacy, security and third-party risk management.

Data Eliminate

Data Eliminate

Data Eliminate provide data destruction, secure end-of-life IT asset disposal, and data protection consultancy services.

RackTop Systems

RackTop Systems

RackTop Systems is the pioneer of CyberConverged data security, a new market that fuses data storage with advanced security and compliance into a single platform.

Hub One

Hub One

Hub One is a leading player in digital transformation with expertise in broadband connectivity, business solutions for traceability and mobility, IOT in industrial environments and cybersecurity.

Red Piranha

Red Piranha

Red Piranha's Crystal Eye Unified Threat Management Platform is designed for Managed Service Providers and corporations that need extreme security that is both easy to use and affordable.

Spike Reply

Spike Reply

Spike Reply is the company within the Reply Group focusing on cybersecurity and personal data protection.

Cardonet

Cardonet

Cardonet is an IT Support and IT Services business offering end-to-end IT services, 24x7 IT Support to IT Consultancy, Managed IT and Cyber Security.

Devolutions

Devolutions

Devolutions make best-in-class Privileged Access Management, Password Management, and Remote Connection Management solutions available to ALL organizations — including SMBs.

Mindflow

Mindflow

Mindflow is dedicated to bringing answers to the challenges the cybersecurity field and beyond face today.

Intellinexus

Intellinexus

Intellinexus turns data into actionable insights to revolutionise decision-making in your business.

Netcom Training

Netcom Training

Netcom Training are a dynamic and forward-thinking training provider, passionate about creating change within the IT, tech and digital industries.