News

2017-04-11

Google Lawsuit Could Be Fatal For Uber

With a $70bn valuation, Uber has won victories against regulators, taxi companies and many competitors. Now they face a challenge from Google.

2017-04-10

Four Steps To Managing Cyber Security Better

Company boards have a pressing fiduciary responsibility, to promote & support development of robust cybersecurity programmes.

2017-04-10

Geolocation, Russian Hackers & False Flag Operations

Experts at ICIT say malicious actors can easily position their breach so that it can be attributed to Russian state-sponsored hackers.

2017-04-10

ENISA’s Threat Rankings: From Malware To Cyber Spies

Europe's computer security agency has set out a list of the top online threats with a warning that hacking for profit is the biggest trend.

2017-04-10

US Buys Mysterious ISIS Drone Killer

The US Air Force is trying to counter small armed drones and is testing multiple technologies and systems to counter deadly ISIS UAVs in Mosul.

2017-04-10

Trump Administration's Policy On Cybersecurity

'If you're not thinking of cyber first, I don't know what you should be thinking about.' Increased spending on surveillance & encryption.

2017-04-08

Are Employees Your Weakest Link When It Comes To Security?

Your technology could have every safety feature and yet a lack of employee education could instantly compromise all of that. By Jane Frankland

2017-04-07

London Conference: Protecting Critical Infrastructure

SGG- Global: The Cybersecurity Protecting Critical Infrastructure Conference. 16th-17th May 2017 London

2017-04-07

More Details Of Crippling Attack On UK Bank Emerge

Lloyds Bank call in the cybersecurity experts to investigate the attack which stopped a substantial number of customers using their online accounts.

2017-04-03

Britain Bombarded With High Level Cyber Attacks

Britain’s new cybersecurity chief says attacks by Russian and Chinese sponsored hackers have ‘threatened national security’

2017-04-04

Singapore Defense Ministry Under Remote Attack

Secure system used by military personnel to access the Internet through terminals at the ministry & other facilities has been compromised.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

iboss Network Security

iboss Network Security

The iboss cloud is designed to deliver Network Security as a Service, in the cloud, using the best malware engines, threat feeds and log analytics engines.

KoolSpan

KoolSpan

KoolSpan’s security and privacy solutions address the growing threat of loss or theft of intellectual property, information, and proprietary assets.

Atea

Atea

Atea is the market leader in IT infrastructure for businesses and public-sector organizations in Europe’s Nordic and Baltic regions.

ThreatSTOP

ThreatSTOP

ThreatSTOP is a cloud-based automated threat intelligence platform that converts the latest threat data into enforcement policies to stop attacks before they become breaches.

Omada

Omada

Omada is a leading provider of IT security solutions and services for identity management and access governance.

Vesta

Vesta

Vesta Corporation is a global provider of a scalable suite of fraud and payment solutions for online commerce.

IBLISS Digital Security

IBLISS Digital Security

How cyber-resilient is your business now? We help companies to continuously answer this never-ending C-level question.

Nextcloud

Nextcloud

Nextcloud offers offers solutions to the combined need of security and ubiquitous access to data and collaboration technology.

Griffeshield

Griffeshield

Griffeshield is a company specialised in new information technologies used to protect Intellectual Property.

Enet 1 Group1

Enet 1 Group1

Enet 1 Group audits, assesses, recommends, and delivers tested solutions for the ever-increasing threats to your critical systems and digital assets

SecurityGen

SecurityGen

SecurityGen is a global cybersecurity start-up focused on telecom security, with a focus on 5G networks.

NXM Labs

NXM Labs

NXM is a leader in a leader in advanced cybersecurity software for connected devices.

Telindus

Telindus

Telindus is the strategic IT partner for the flexible organization of the future. We build optimal IT infrastructure with four components: networking, cloud, cybersecurity and data & AI.

dWallet Labs

dWallet Labs

dWallet Labs is a cybersecurity company specializing in blockchain technology. We believe that the future of Web3 relies on cutting edge cryptography and unabated security.

Offensive Security Manager (OSM)

Offensive Security Manager (OSM)

Offensive Security Manager is the ultimate AI software that will enforce offensive security automation, orchestration, coverage, ensure quality, and lets you manage whole process.

Heyhack

Heyhack

Heyhack is a SOC 2 Type II certified automated penetration testing platform for web apps and APIs.