News

2016-03-30

Shopping List: Cybersecurity Acquisitions In 2016

2016 has already seen several big companies buying up smaller, privately held firms as they look to plug the gaps in their solutions.

2016-03-30

Cyber Criminal Underground In The Deep Web

A new report published by the experts at TrendMicro highlights the differences between the principal underground ecosystems worldwide.

2016-03-30

Swedish Police Investigate Media Cyber-Attacks

Swedish police say they are investigating major cyber attacks against some of the country's leading media companies.

2016-03-30

Driverless Truck Convouys To Get UK Trials

Driverless lorries and cars will be trialed in the UK, the government has confirmed.

2016-03-30

Anonymous Threaten ISIS After Belgium Attacks

Anonymous has come forward and issued a threat against the Islamic State terrorist group, warning of impending cyber-attacks.

2016-03-29

NSA Hacked Penatgon Command-Control In 4 Days

History: In the first-ever exercise testing the US military's cyber defenses in 1997 the NSA hacked into the DoD's entire network in 4 days flat.

2016-03-29

Poland Strengthens Cybersecurity Against Russian Threat

Poland moves to unify cybersecurity response and bolster its defences in the wake of Russian hybrid warfare against neighbouring Ukraine.

2016-03-29

FBI Can Unlock iPhone Without Apple’s Help

US authorities have cancelled the court hearing with Apple, saying an ‘outside party’ has shown a potential way to crack Syed Farook’s iPhone.

2016-03-29

Clinton Emails Suggest Google's Assistance In Undermining Assad

An interactive tool created by Google was designed to encourage Syrian rebels and help bring down the Assad regime.

2016-03-31

Facial Recognition Might Stop the Next Brussels

Keeping terrorists away from crowded spaces requires recognizing them before they get there. No easy task.

2016-03-22

Cybercrime Is Changing

The anonymous and borderless nature of cybercrime puts every organisation at potential risk.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Ripjar

Ripjar

Ripjar is a global company of talented technologists, data scientists and analysts designing products that will change the way criminal activities are detected and prevented.

Yokogawa Electric

Yokogawa Electric

Yokogawa is an electrical engineering company providing measurement, control, and information technologies including industrial cyber security.

European Recruitment

European Recruitment

European Recruitment is an award-winning, international recruitment agency specialising in niche technology areas including Cyber Security.

WetStone Technologies

WetStone Technologies

WetStone develops software solutions that support investigators and analysts engaged in eCrime Investigation, eForensics and incident response activities.

Truepic

Truepic

Truepic provides technologies that prevent fraud, identity theft, misinformation, and disinformation caused by generative, manipulated, or deepfake digital content.

Ataya & Partners

Ataya & Partners

Ataya & Partners is a consulting company that delivers data protection, cybersecurity and IT & Digital governance services.

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory is a manufacturer of military security and data destruction equipment for sensitive, classified, and secret information.

KETS Quantum Security

KETS Quantum Security

KETS harnesses the properties of quantum mechanics to solve challenging problems in randomness generation and secure key distribution and enable ultra secure communications.

GRSi

GRSi

GRSi deliver next-generation systems engineering, cybersecurity, technology insertion and best practices-based Enterprise Operations (EOps) management.

Infosec Cloud

Infosec Cloud

Infosec Cloud is a specialist Cyber Security company offering fully managed Training & Testing Services in addition to market leading Cyber Security technology and accredited professional services.

rSolutions

rSolutions

rSolutions delivers managed cybersecurity services to clients in many industry sectors including financial services, telecommunications, energy, government and retail.

Cranium

Cranium

AI is being implemented into every business process, but nobody knows whether their AI is secure. Our mission is to deliver security and trust to the AI revolution.

IDVerse

IDVerse

IDVerse is focused on making user verification effortless through technology. We build intelligent tools that protect users from identity fraud while enabling a seamless user experience.

Ultima

Ultima

Ultima are on a mission to help businesses unlock their true potential by using the right IT to protect your company’s revenue and reputation – 24/7.

SecZone

SecZone

SecZone is a Chinese enterprise with a mission to "Make It Secure." We are dedicated to driving software security innovation globally.

Treacle Technologies

Treacle Technologies

Treacle Technologies are a Cyber Security startup with a focus on Defensive Security.