News

2015-06-29

4 News Apps that Will Change Everything

These apps combine the eclectic harvesting of the best content from thousands of news sources with the curating power & skills of human editors.

2015-06-27

5 Facts that Explain Cyber Warfare

The biggest threat to national security these days comes from a computer with a simple Internet connection.

2015-06-27

Drone Operators’ Jobs Are Safe From Robots…For Now

It’s not that machines can’t see & it’s not that they can’t think. They lack imagination & that ability is central to target recognition.

2015-06-27

Hackers target Polish airline carrier LOT

An "IT attack" meant the airline unable to create flight plans and flights were not able to depart from Warsaw.

2015-06-27

NSA Chief: Don’t Assume China Hacked OPM

The cybersecurity group FireEye says it’s “highly confident” that Chinese hackers did it but Admiral Rogers is not so sure.

2015-06-27

Data Security and Loss of Control Killing Cloud?

Opinion By Frank Jennings Cloud & Commercial Lawyer at Wallace LLP

2015-06-25

US spied on French presidents

Espionage Elysee: How the NSA spied on communications of 3 French presidents as well as French ministers & the ambassador to the US.

2015-06-24

A Quick Tour in the Web Black Market

The most important requirement for both buyers and sellers is the anonymity of the transaction using untraced networks & virtual currency.

2015-06-23

WhiteHat Security: Majority of Websites Are Vulnerable to Data Thieves

Public administration websites had the worst record with 64% at risk every day, followed by Retail at 55%.

2015-06-23

Financial Services Firms Stare into the Abyss as Data Breaches Rocket

The UK Information Commissioner’s Office reports 791 breaches in this sector between 2012 and 2014, including 585 in 2014 alone.

2015-06-23

PwC says UK Security Breaches Often Not Reported

The majority of UK organisations suffering a security or data breach will never report it.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Pen Test Partners LLP

Pen Test Partners LLP

Pen Test Partners provides penetration testing, security assessment and training services.

Teradata

Teradata

Teradata is a leading provider of enterprise big data analytics and services. Applications include Cyber Security Analytics.

SI-CERT

SI-CERT

SI-CERT (Slovenian Computer Emergency Response Team) is the national cyber scurity incident response center for Slovenia.

macmon secure

macmon secure

macmon secure develops network security software, focussing on Network Access Control.

Squalio

Squalio

Squalio is an information technology group that delivers solutions and services for secure and effective IT management.

SEEK

SEEK

SEEK create world-class technology solutions to address the needs of job seekers and hirers across multiple sectors including cybersecurity.

Intercast Global

Intercast Global

Intercast's mission is to be a strategic resource to our clients in Risk Reduction. We are a global leader in cyber security staffing and consulting to the enterprise.

Cado Security

Cado Security

Cado Security is pushing digital forensics, and cyber incident response to the next level with an incident response software platform and specialist consulting services.

Motiv ICT Security

Motiv ICT Security

Motiv is the ICT security specialist that provides public and private sector organisations with IT security solutions and services to prevent cybercrime, data theft and data breaches.

Intracom Telecom

Intracom Telecom

Intracom Telecom is a global telecommunication systems & solutions vendor offering a complete range of professional services and solutions including Information Security.

Regtank Technology

Regtank Technology

Regtank is a one-stop compliance solution for fintechs, navigating compliance, security and risk management.

European Cybersecurity Competence Centre (ECCC)

European Cybersecurity Competence Centre (ECCC)

The ECCC aims to increase Europe’s cybersecurity capacities and competitiveness, working together with a Network of National Coordination Centres to build a strong cybersecurity Community.

Cyber Security Council UAE

Cyber Security Council UAE

The Cyber Security Council's vision is to protect UAE cyberspace, maintain confidence in our digital infrastructure and institutions, and build a cyber-resilient society.

Somerville

Somerville

Somerville are a full service IT partner with over 40 years experience delivering exceptional service and value to our customers.

Teleskope

Teleskope

Teleskope are on a mission to empower businesses to protect sensitive data by default.

ShieldIO

ShieldIO

ShieldIO Real-Time Homomorphic Encryption™ enables your organization to reach regulatory compliance without compromising data availability.