News

2016-11-21

Competitive Marketing Analysis (£)

A 4 Point Checklist for analysing your competitors.

2016-11-21

Was Donald Trump's Surprise Victory Hidden In The Data?

A dawning realisation that the Technology industry missed something fundamental about the fears & motivations of the people who use its products.

2016-11-24

The Internet of Things Must Not Be Allowed To Turn Into The Internet of Trouble

The lack of consumer awareness combined with a dearth of regulation over web connected devices is a recipe for IoT disaster.

2016-11-23

German Spy Chief Fears Russian Interference In 2017 Elections

Germany is alarmed that Russia may seek to interfere in its 2017 national elections, echoing US concerns prior to Donald Trump's victory.

2016-11-25

US Army Command Learning Cyberwar From Social Media

Young, social media-using soldiers may be the linchpin in the US Army's efforts to use cyberwar networks & virtual effects against enemies.

2016-11-24

Some Observations On Britain's New Cyber Security Strategy

A new strategy document spells out an assertive posture by a UK government that seems wary of sharing intelligence capabilities between allies.

2016-11-28

New Business Protection From Cyber Attackers

Entrepreneurs can be so focused on business building & day-to-day operations that they forget to protect their most precious data.

2016-11-23

BlackNurse DDoS Attacks Are Small But Mighty.

BlackNurse is a revolutionary cyber-attack technology. Hackers only need a laptop and minimal data to perform a crippling DDoS attack.

2016-12-03

Four Amazing Cybersecurity Facts

The global cybersecurity market is growing in every way. In Value, in Risks, in Costs and in the level of internal & external Threat.

2016-11-21

Adult Friend Finder & Penthouse Hacked

Adult dating and pornography site company Friend Finder Networks has been hacked, exposing 412m private accounts.

2016-12-06

Why Science Couldn’t Predict a Trump Presidency

The unexpected result wasn’t a failure of science.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Paraben

Paraben

Paraben provides digital forensics solutions for mobile devices, smartphones, email, hard drives, and gaming system.

ComTrue Technologies

ComTrue Technologies

ComTrue Technologies provides artificial intelligence solutions and information security solutions.

Kroll

Kroll

Kroll provides clients a way to build, protect and maximize value through our differentiated financial and risk advisory and intelligence.

Norwegian Information Security laboratory (NISlab)

Norwegian Information Security laboratory (NISlab)

NISlab conducts international competitive research in information and cyber security and operates study programs in this area.

SecureMetric Technology

SecureMetric Technology

SecureMetric is one of SE Asia’s leading players in the field of digital security with a focus on Software Licensing Protection, 2-Factor Authentication, Advanced Identity and Access Management, Publi

Cryptosense

Cryptosense

Cryptosense provides the first application security software dedicated to the detection and remediation of crypto vulnerabilities.

AAROH

AAROH

AAROH helps customers in Government, Law Enforcement, and Enterprises to identify, prevent, detect, resolve and protect from threats, crimes, breaches & fraud.

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity make Cars & Infrastructures Cybersecure.

VirtualArmour

VirtualArmour

VirtualArmour is a managed security services provider with global reach and local attitude.

Boeing

Boeing

Boeing is the world's largest aerospace company and leading manufacturer of commercial jetliners, defense, space and security systems.

Infostream

Infostream

Infostream is a leading integrator of Digital Transformations Solutions (DTS); Public, Private, and Hybrid Cloud; Cybersecurity; Data Integrity; DevOps, DevSecOps, and Infrastructures.

Analygence

Analygence

ANALYGENCE is your trusted partner for mission support, cyber solutions, and management services.

Technivorus Technology

Technivorus Technology

Technivorus is a deep-tech firm delivering customized Cybersecurity, Digital Marketing, Web & App Development, and multifarious IT services for businesses across the globe.

J.S. Held

J.S. Held

J.S. Held is a global consulting firm providing technical, scientific, and financial expertise across all assets and value at risk.

Recast Software

Recast Software

Recast Software exists to simplify the work of IT teams and enable them to create highly secure and compliant environments.

SecureLake

SecureLake

SecureLake (formerly Managni) is one of the most trusted US-based IT security and infrastructure companies.