News

2016-05-24

As Pentagon Dawdles, Silicon Valley Sells It’s Hottest Technology Abroad

Technolgy CEOs say red tape and onerous requirements are undermining just the sorts of products that the Pentagon says it wants.

2016-05-23

Could Bitcoin’s Blockchain Run An Entire City?

The smart city is not a pipe dream, but it is a big, intimidating problem. Blockchain technology could solve that.

2016-05-25

Cyber Insurance: Security Tool or Hype?

Cyber insurance fits into the broader context of a security strategy focused on risk mitigation

2016-05-25

Mobile Spying – What’s Possible, Ethical Or Useful?

Many widely used mobile apps have a legitimate feature - remote mobile monitoring. Is this any different from illegitimate spyware?

2016-05-20

Related Aspects Of A Breach: Impact Of Partners & Suppliers

Analysis of the giant breach at retailer Target shows that business partners and suppliers can spell big trouble for an organization’s security.

2016-05-20

Vulnerable Australia Boosts National Cyber Security

Australia introduces a multi-million-dollar national cybersecurity policy to combat hacking but stops short of blaming recent attacks on China.

2016-05-23

Healthcare Execs Credit IT With Improving Care

Healthcare managers say the cost savings and interoprability benefits of improved IT systems outweigh the security concerns.

2016-05-23

Unified Cyber Command To Help US React Faster

Defense leaders are contemplating elevating US CyberCom to a full-fledged unified command.

2016-05-20

Enhanced Attribution Program To Identify & Track Hackers Worldwide

Pentagon researchers want to consistently identify virtual personas and individual malicious cyber operators across different endpoint devices.

2016-05-18

'Guccifer' Claims He Got Inside Hillary Clinton's Server

Romanian hacker claims to have gained access to the former US Secretary of State's Clinton's "completely unsecured" server.

2016-05-16

Bank Launches Big Data Insight Product For SMEs

A new online service to provide insights and deeper analysis of customer transactions and highlight behaviour and spending patterns.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Nixon Peabody LLP

Nixon Peabody LLP

Nixon Peabody LLP is an international law firm with offices across the USA, Europe and Asia. Practice areas include Data Privacy and Cyber Security.

CERT-MU

CERT-MU

CERT-MU is the Mauritian National Computer Security Incident Response Team.

Secure360

Secure360

Secure360 focuses on the following key areas: governance, risk and compliance, information security, physical security, business continuity management, and professional development.

V-Key

V-Key

V-Key is a global leader in software based digital security, providing solutions for mobile identity, authentication, authorization, and mobile payments for major banks.

Jumio

Jumio

Jumio’s end-to-end identity verification and authentication solutions fight fraud, maintain compliance and onboard good customers faster.

SwiftSafe

SwiftSafe

SwiftSafe is a cybersecurity consulting company providing auditing, pentesting, compliance and managed security services.

BHC Laboratory

BHC Laboratory

BHC Laboratory is a cyber capabilities’ development company for a wide range of global customers.

Rhino Security Labs

Rhino Security Labs

Rhino Security Labs is a top penetration testing and security assessment firm, with a focus on cloud pentesting, network pentesting, web application pentesting, and phishing.

WidePoint

WidePoint

WidePoint Corporation is an innovative provider of Trusted Mobility Management (TM2) solutions.

Ridge Canada Cyber Solutions

Ridge Canada Cyber Solutions

Ridge Canada helps insurance brokers and insurance buyers understand, evaluate, and secure cyber coverage that is tailored to their business.

Cybergroot

Cybergroot

Cybergroot provides Cybersecurity Assessment services and professional Information Security trainings.

Disecto Technologies

Disecto Technologies

At Disecto, we provide SaaS based Data Discovery, Classification and a remediation solution for data privacy compliance.

Adaptiva

Adaptiva

Adaptiva, the autonomous endpoint management company, delivers the fastest way to patch and manage endpoints at scale.

Frenos

Frenos

The Frenos Platform helps enterprises understand their most probable attack paths while highlighting the most effective risk mitigations to deter and defend against today’s adversaries.

Operational Systems (OpSys)

Operational Systems (OpSys)

OpSys is a leading Managed IT and Cyber Security provider protecting the critical elements of businesses across the globe.

Locket Cybersecurity

Locket Cybersecurity

Locket’s certified students provide pro-bono security audits for small and medium-sized businesses in the Chicagoland area.