News

2017-05-31

EU’s New Data Rules Are 1 Year Away

May 25 2018 is a date that should be etched in red on the calendar of any company that does business in the European Union

2017-05-31

Current Cybercrime Threats Originate In Espionage

Spy agencies like the US National Security Agency hoard weapons that, by their very nature, target civilian infrastructure.

2017-05-28

Mathematical Analysis Suggests Marlowe And Shakespeare Co-Wrote

Computerised textual analysis is now so sophisticated that it can distinguish between Shakespeare writing like Marlowe and Marlowe alone.

2017-05-30

Eight Steps For Cloud Security

Migrating corporate data to the cloud is really just a form outsourcing and testing the service provider's security means asking some hard questions.

2017-05-30

WannaCry Also Hit Windows 7 Systems

Not just unsupported networks running Windows XP were affected. Untpatched Windows 7 users also suffered from the attack.

2017-05-30

Making Sense Of Dark Data

Using AI to analyse the vast amounts of unstructured digital data being generated looks like a growth business. Apple is investing.

2017-05-30

Crimes Of The Future Will Be Solved Using IT, Robot CSIs, Smell & VR

Smell. Sound. Digital Reconstruction: Crime scene investigators will soon be using a raft of new tools & analytical techniques.

2017-05-30

Electronic Warfare Development Rate

The US wants to provide NATO soldiers the ability to understand the electromagnetic spectrum they find themselves in on the battlefield.

2017-05-26

North Korea's Unit 180 Managed WannaCry Attack

Symantec says a hacking group closely tied to North Korea was behind the massive WannaCry attack hitting 200,000 plus computers in 150 countries.

2017-05-26

A Major Development in Deep-Learning

Neurala’s neural network software uses a bio-inspired approach to mimic the way the human brain learns and analyses its environment.

2017-05-26

US Must Project Cyber Warfare Capabilities to Deter Attacks

Unwillingness to operate offensively in cyber-space is driven by a fear of compromising our intelligence community's sensitive tradecraft.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Conscio Technologies

Conscio Technologies

Conscio Technologies is a specialist in IT security awareness. Our solutions allow you to easily manage innovative online IT awareness campaigns.

Intrinsic-ID

Intrinsic-ID

Intrinsic-ID's authentication technology creates unique IDs and keys to authenticate chips, data, devices and systems.

Finjan Holdings

Finjan Holdings

Finjan solutions are aimed at keeping the web, networks, and endpoints safe from malicious code and security threats.

HID Global

HID Global

HID Global is a trusted leader in products, services and solutions related to the creation, management, and use of secure identities.

Mondo

Mondo

Mondo is the largest national staffing agency specializing exclusively in high-end, niche IT, Tech, and Digital Marketing talent. Areas of expertise include Cybersecurity.

Zeneth Technology Partners

Zeneth Technology Partners

Zeneth is a consulting firm providing information technology and cybersecurity services to federal and commercial clients.

Authomize

Authomize

Authomize aggregates identities and authorization mechanisms from any applications around your hybrid environment into one unified platform so you can easily and rapidly manage and secure all users.

NETRIO

NETRIO

If you are looking for a highly mature, exceptionally competent Managed Service Provider, NETRIO has solutions to keep your business running at warp speed with zero disruptions.

Winterhawk

Winterhawk

Winterhawk is a specialist and leading global Cyber, ESG, GRC, Risk & Identity consulting practice.

Cyber Security Services

Cyber Security Services

Cyber Security Services is a cyber security consulting firm and security operations center (SOC).

Zama

Zama

Zama - pioneering homomorphic encryption. We believe people shouldn't care about privacy. Not because it doesn't matter, but because it shouldn't be an issue!

Razilio

Razilio

Razilio is a boutique cybersecurity consultancy located in Sydney, Australia and serving the world.

TeamT5

TeamT5

TeamT5 Inc. is a leading cybersecurity company dedicated to cyber threat research and solutions.

Ark Infotech

Ark Infotech

Ark Infotech is a provider of cloud management services, selective support services, and technology solutions.

Clumio

Clumio

Clumio provides autonomous backup and recovery for critical cloud data.

RESTIV Technology

RESTIV Technology

RESTIV Compliance Copilot is your partner in continuous compliance. Real-time monitoring, continuous testing, and transparent evidence—no surprises, just peace of mind.