News

2015-11-30

Entrepreneur’s Guide To Surviving A Tech Bubble

Venture Capital money is chasing the next tech Unicorn. As cyber security is the hot startup sector it's time to ask a few questions.

2015-11-23

Phony War: US Military To Carry Out Pretend Cyber War Against China & Russia

US lawmakers want to project more power in the newest military domain.

2015-11-23

A Spy Firm’s Price List for Secret Hacker Techniques

The zero-day broker startup Zerodium has published it's price list for different classes of digital intrusion techniques & software targets.

2015-11-23

Restricting Encryption Wouldn’t Stop Paris-Style Attacks

It’s not clear that undermining strong encryption would do anything to prevent terrorism.

2015-11-23

Britain Building Cyber Forces to Attack ISIS

Britain will bolster spending on cyber defences, simplify its state cyber structures and build its own offensive cyber capability to attack adversaries.

2015-11-23

Anonymous Acts on Cyber War Threat

Anonymous is making good on its declaration of cyber war on terrorist group ISIS.

2015-11-21

After Paris, ISIS Moves Propaganda Machine to Darknet

In a series of blog posts and messages sent to its users right after the Paris attacks, ISIS news & forums are moving entirely to the Dark Net.

2015-11-18

Thailand’s Military to Set Up New Cyberwar Unit

Thailand will establish a new group to counter growing cyber threats. The move follows plans by the ruling junta for a single Internet access point.

2015-11-18

FBI Takes Down Alert on Chip & PIN Credit Cards

The American Bankers Association are not happy about the FBI's warning to consumers on the risks on new Chip & PIN credit cards.

2015-11-18

Cybercrime: How to Recognize an Online Fraudster

The switch to Chip & PIN cards in the US is driving attempts to profile online fraudsters. The results may surprise you.

2015-11-21

Cyber War and Real War Coincide In Ukraine

The type of cyber war that the US government and military are most worried about is already in full swing in the Ukraine.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Panda Security

Panda Security

Panda Security specializes in the development of endpoint security products and is part of the WatchGuard portfolio of IT security solutions.

National Cyber Security Centre (NCSC) - United Kingdom

National Cyber Security Centre (NCSC) - United Kingdom

The NCSC acts as a bridge between industry and government, providing a unified source of advice, guidance and support on cyber security, including the management of cyber security incidents.

StickyMinds

StickyMinds

StickyMinds is the web's first interactive testing community exclusively engaged in improving software quality throughout the software development lifecycle.

Athena Forensics

Athena Forensics

Athena Forensics is one of the UK's leading providers of Computer Forensics, Mobile Phone Forensics, Cell Site Analysis and Expert Witness Services.

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security is a leading manufacturer of network security appliances for use in industrial environments.

Secusmart

Secusmart

Secusmart provide highly secure and encrypted speech and data communication solutions.

Cyber Security Austria (CSA)

Cyber Security Austria (CSA)

Cyber Security Austria (CSA) is an independent non-profit association with the aim to address security issues in the area of IT/cyber security of critical/strategic infrastructures in Austria.

Intertrust Technologies

Intertrust Technologies

Intertrust Technologies is a software company specializing in trusted computing products and services.

Cyber Struggle

Cyber Struggle

At Cyber Struggle, our aim is training and certifying the special forces of the cyber world.

Ockam

Ockam

Ockam gives you the tools you need to establish an architecture for trust within your connected device applications.

Next47

Next47

Next47 is a global venture firm, backed by Siemens, committed to turning today's impossible ideas into tomorrow's indispensable industries.

Prodera Group

Prodera Group

Prodera Group is a specialist technology consulting partner trusted to help navigate the complex and dynamic lifecycle of change and transformation.

Orbus Software

Orbus Software

Orbus develops, markets and sells enterprise software which helps large, blue chip and government organisations across the globe to achieve digital transformation outcomes.

SeeMetrics

SeeMetrics

SeeMetrics is an automated cybersecurity performance management platform that integrates security data and business objectives into a simple interface.

RiverSafe

RiverSafe

RiverSafe is a professional services provider specialising in Cyber Security, Data Operations and DevOps, putting security at the heart of everything we do.

Trustaira

Trustaira

Trustaira is the first deep tech solution and service company in Bangladesh.