News

2016-08-09

Insider Trading: Ukrainian Hackers Accomplice Pleads Guilty

US stockbroker pleads guilty to conspiracy for his role in an insider-trading ring that reaped millions of dollars in illicit profits.

2016-08-09

Mobile Battery Tracks You Online

A little-known web standard that lets site owners tell how much battery life a mobile device has left has been found to enable tracking online.

2016-08-08

Brexit Leading To Rising Tide Of Cyber Scams

Economic uncertainty following the Brexit vote is creating the perfect conditions for cyber-fraud

2016-08-07

EU Cyber Crime Commissioner is King

Post Brexit Vote: Briton becomes EU commissioner for the 'security union' to develop European security and counter-terrorism plans.

2016-08-04

Clinton Campaign Confirm Mystery Hackers Accessed Data

Is Russia using hackers to influence the outcome of the US Presidential election and is the US using proxies to retaliate?

2016-08-03

Russian Government Under Multiple Cyber Attack

A "professional" cyber-attack has hit Russian government bodies, says the country's domestic intelligence service (FSB).

2016-08-03

The End Of Your Undivided Attention

Many things have sought to capture your undivided attention, but that might be the ghost of a goal in today’s multichannel & multimedia reality.

2016-08-05

Data Protection Tips for Proposed US Cybersecurity Laws

Proposed new US cybersecurity legislation is making many businesses nervous. These tips will help you be prepared.

2016-08-05

Key Trends In Machine Learning & Artificial Intelligence

While there is agreement on the importance of machine learning, few companies have adequate expertise to get the technology to do what they want.

2016-08-07

Companies See Cyber Threats But Can’t Deal With Them

As the risk of cyber-crime intensifies, most large organizations are still not prepared to deal with the onslaught of digital attacks.

2016-08-04

Cybersecurity Is A Boardroom Blind Spot

Wake Up Call: Most boardrooms only hear about cybersecurity twice a year. Or until there is a business critical cybersecurity incident.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CyberSource

CyberSource

CyberSource provides online payment and fraud management services for medium and large-sized merchants.

Cambridge Intelligence

Cambridge Intelligence

Cambridge Intelligence are experts in network visualization and finding hidden trends in complex connected data. Applications include cybersecurity.

Niagara Networks

Niagara Networks

Niagara Networks is a Network Visibility industry leader, with emphasis in 1/10/40/100 Gigabit systems and mission-critical IT and security appliances.

Iceberg

Iceberg

Since 2016, Iceberg has redefined how businesses approach hiring in the Cybersecurity and eDiscovery space.

Data443 Risk Mitigation

Data443 Risk Mitigation

Data443 Risk Mitigation provides next-generation cybersecurity products and services in the area of data security and compliance.

Redborder

Redborder

Redborder is an Open Source network visibility, data analytics, and cybersecurity Big Data solution that is scalable up to the needs of enterprise networks and service providers.

Pareteum

Pareteum

Pareteum is a leading Global provider of mobile networking software and services. Our mission is to provide a single solution to the problem of fully enabling and securing the Mobile Cloud.

MPC Alliance

MPC Alliance

A consortium of developers and practitioners of multiparty computation (MPC), committed to accelerating market awareness and adoption of MPC to increase the security and privacy of online services.

Softcat

Softcat

Softcat offer a broad portfolio of IT services and solutions covering Hybrid Infrastructure, Cyber Security, Digital Workspace and IT Intelligence.

Fluid Attacks

Fluid Attacks

Fluid Attacks specialize in red team operations as well as technology development that continuously enhance our security testing services.

DoControl

DoControl

DoControl gives organizations the automated, self-service tools they need for SaaS applications data access monitoring, orchestration, and remediation.

Fortify 24/7

Fortify 24/7

Fortify 24×7 provides a robust portfolio of managed cybersecurity solutions to help you identify and prevent attacks.

Primus Institute of Technology

Primus Institute of Technology

At Primus Institute of Technology our mission is to inspire, support, and empower current and aspiring IT professionals through training and career development workshops.

PRE Security

PRE Security

PRE Security is leading the transition into the next era of AI cybersecurity with a new model: Predict & Prevent.

Operational Systems (OpSys)

Operational Systems (OpSys)

OpSys is a leading Managed IT and Cyber Security provider protecting the critical elements of businesses across the globe.

Blind Insight

Blind Insight

Field-level searchable encryption plus fine-grained programmable access controls. All wrapped neatly in developer-friendly APIs and SDKs. Data protection perfection.