News

2015-05-01

Will Cyber Insurance Providers Reward Good Security?

There are three key factors that will drive demand for cyber insurance products.

2015-05-11

Hacked. Or, How to Become a Four-Star General

"Someone hacked into the Department of Defense [DoD] network," Gen. Keith Alexander

2015-05-01

Disapproved: UK College of Policing Blacklists Former Officers for Data Misdeeds

How effective are the British police at investigating internal misconduct?

2015-05-04

Is Germany Paranoid About US Spying ?

The idea of personal data privacy is deeply ingrained in German culture & recent events have deepened suspicions about the US.

2015-05-04

Germany Spied on EU Officials for the US

Germany's BND foreign intelligence agency helped the National Security Agency (NSA) carry out "political espionage".

2015-05-04

Is the US - Iran Cyber War Over?

Washington and Tehran may have come to an understanding on nuclear weapons but will the cyberwar go on?

2015-05-01

Forget Hackers, The Biggest Internet Security Threat Is Closer to Home

According to Verizon the biggest threat to your private information may actually be you!

2015-05-08

Stellar Wind: CIA analysts didn’t use the NSA’s Spy program.

CIA surveillance & bulk data collection program was so secretive that the agency was unable to make “full use” of its capabilities.

2015-05-06

France’s Intelligence Bill: legalising mass surveillance

The French government claims its new Intelligence Bill is defined in opposition to the American and British models – Is it really?

2015-04-28

Largest U.S. Data Breaches in the Last 10 Years

A Telling Infographic: In 2014 alone more than 900 million data records were lost or stolen.

2015-04-30

How Terrorists Are Turning Robots Into Weapons

It's time to rethink security with the rise of robotics.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CERT-SE

CERT-SE

CERT-SE is the national and governmental Computer Security Incident Response Team of Sweden.

Nohau

Nohau

Nohau provide services for safe and secure embedded software development.

Professional Insurance Agents (PIA)

Professional Insurance Agents (PIA)

Professional Insurance Agents (PIA) offer commercial insurance services including Cyber Liability insurance.

Prevalent

Prevalent

Prevalent takes the pain out of third-party risk management. Companies use our services to eliminate the security and compliance exposures that come from working with vendors and suppliers.

Sift

Sift

The Sift Digital Trust Platform protects your business and customers from all vectors of fraud and abuse through our Live Machine Learning, global trust network and automation technologies.

TI Safe

TI Safe

TI Safe provide cybersecurity solutions for industrial networks of main critical infrastructures in Latin America.

Cortado Mobile Solutions

Cortado Mobile Solutions

Cortado Mobile Solutions creates enterprise mobility and file sharing solutions for companies, teams and freelancers.

CYBAVO

CYBAVO

CYBAVO is a cryptocurrency security company founded by experts from the cryptocurrency and security industries.

European Healthcare Fraud & Corruption Network (EHFCN)

European Healthcare Fraud & Corruption Network (EHFCN)

EHFCN is the only organisation dedicated to combating fraud, corruption and waste in the healthcare sector across Europe.

Healthcare Fraud Shield (HCFS)

Healthcare Fraud Shield (HCFS)

The focus of Healthcare Fraud Shield is solely on healthcare fraud prevention and payment integrity with a successful approach based on many unique advantages we deliver to our clients.

Gijima

Gijima

Gijima is one of SA’s leading ICT companies in Cloud & Outsourcing, Systems integration, Human Capital Management & Training, Cybersecurity, and Unified Communications.

Chainlink

Chainlink

Chainlink expands the capability of smart contracts by enabling access to real-world data and systems without sacrificing the security and reliability guarantees inherent to blockchain technology.

Axiado

Axiado

Axiado Corporation is a security processor company redefining hardware root of trust with hardware-based security technologies, including per-system AI.

Cranium

Cranium

Cranium are an international consultancy organisation specialised in privacy, security and data management.

Threat Con

Threat Con

Threat Con is a one of its kind event in Nepal, a series of annual international security conventions similar to the famous Black Hat and DEF CON conferences.

Infrassist Technologies

Infrassist Technologies

We're Infrassist - a trusted white label Managed IT & Professional Services partner for MSP businesses.