News

2017-04-21

The Next Big Conflict Will Turn On Artificial Intelligence

Whoever collects the most data on Day One just might win the next war before a even single shot is fired.

2017-04-21

Cyber Attacks Against Korean Missile Launches

The North Korean government appears to be marching toward its goal of nuclear weapons, slowly or otherwise.

2017-04-19

FBI’s International Framework On Encrypted Data Access

The FBI wants an international agreement between governments to ease fears about IT products with government-mandated backdoors.

2017-04-19

Safeguard Data When Employees Leave

Employee turnover comes with a variety of corporate, logistical and financial hurdles, they also create data protection & security problems.

2017-04-19

London Terrorist Attack Is A Wake-Up Call For Social Media

London Police Chief warns social media giants Facebook, Google & Twitter to 'put their house in order' following the deadly attack on Westminster.

2017-04-19

Stop Data Breaches, Start With Databases

A common source for numerous large scale data breaches are poorly secured databases that connect directly to the internet.

2017-04-19

Russian Propaganda Connections

Fake news stories are generated by unrecognisable websites using anonymous sources, hoping to be picked up by mainstream media.

2017-04-18

Cyber War Calls For A New Look US Soldier

Passing basic training and a drugs test: The best cyber warriors don’t always make the best soldiers.

2017-04-18

Ageing Energy Systems Hold Huge Potential For Cyber Attack

The systems that run the US electricity grid, gas pipelines & other critical infrastructure have 25 years’ worth of vulnerabilities that need fixing.

2017-04-18

WikiLeaks Has Published The CIA’s Secrets For Infecting Windows

Wikileaks' release of CIA secret hacking tools includes software to build customised malware to compromise computers running Windows.

2017-04-18

Facebook Accused Of Publishing Child Pornography

Facebook is at risk of prosecution in Britain for refusing to remove potentially illegal terrorist and child pornography content.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Security Weekly

Security Weekly

Security Weekly provides free content within the subject areas of IT security news, vulnerabilities, hacking, and research.

Cortado Mobile Solutions

Cortado Mobile Solutions

Cortado Mobile Solutions is the manufacturer of the mobile device management solution Cortado MDM.

CERT-UG/CC

CERT-UG/CC

CERT-UG/CC is the national Computer Emergency Response Team for Uganda, operating under the National Information Technology Authority (NITA-U)

Pixalate

Pixalate

Pixalate is an omni-channel fraud intelligence company that works with brands and platforms to prevent invalid traffic and improve ad inventory quality.

Security Engineered Machinery (SEM)

Security Engineered Machinery (SEM)

SEM provides comprehensive end-of-life solutions for the protection of sensitive information in government and commercial markets.

Venrock

Venrock

Venrock helps entrepreneurs build some of the world's most disruptive, successful companies. We invest in technology: Security, Cloud Services, Big Data, Healthcare IT, AdTech.

Strategic Cyber Ventures (SCV)

Strategic Cyber Ventures (SCV)

SCV grow cybersecurity companies that disrupt advanced cyber adversaries and revolutionize the cyber product marketplace.

BlackCloak

BlackCloak

BlackCloak provides Concierge Cyber Security for high-net-worth individuals and corporate executives to protect them from cybercrime, reputational risks, hacking and identity theft.

GitProtect.io

GitProtect.io

​GitProtect is a fully manageable, professional GitHub and Bitbucket backup and recovery software that protects repositories and metadata from any event of failure.

META-Cyber

META-Cyber

META-cyber was founded by engineers with experience in process and control-protection to provide cyber security for industrial infrastructure.

Easy Dynamics

Easy Dynamics

Easy Dynamics is a leading technology services provider with a core focus in Cybersecurity, Cloud Computing, and Information Sharing.

J.S. Held

J.S. Held

J.S. Held is a global consulting firm providing technical, scientific, and financial expertise across all assets and value at risk.

Orchestrate Technologies

Orchestrate Technologies

Orchestrate Technologies provides computer network and IT managed services for small and mid-market clients as well as small enterprise businesses.

StepSecurity

StepSecurity

StepSecurity provides a comprehensive security platform for GitHub Actions.

Ncontracts

Ncontracts

Our mission at Ncontracts is to continually improve our clients’ ability to manage risk and compliance.

Neeve

Neeve

Neeve is an edge cloud platform transforming smart buildings and spaces, making them more secure, smarter, and more sustainable.