News

2022-03-14

The US Military Want 5G Fast

Military communications need the rapid transfer of large quantities of data that 5G technology enables, combined with high levels of resilience.

2022-03-21

What Goes On In The Dark Web?

The Dark Web is that part of the Internet that can only be accessed by those in the know, using specific software and configurations to get access.

2022-03-14

Google Buys Mandiant For $5.4bn

Mandiant's highly skilled workforce of cyber security experts will be folded into Google Cloud to create an “end-to-end security operations suite.”

2022-03-15

Cyber Innovation And Industry 4.0

The world is changing technologically faster than ever before, creating new industries, changing existing ones and transforming how things work.

2022-03-14

Zero Trust In The Boardroom

Cyber Security Is A Top Priority For Business Leaders: Reasons why CEOs need to have Zero Trust at the front of their minds. By Rajesh Khazanchi

2022-03-14

AI Is The Future Of Defensive Cyber Security

AI can help reduce costs, improve threat response times and respond to breaches, regardless of the  specific circumstances in which it is used.

2022-03-12

New Tools To Detect Cyber Attacks

Automated monitoring of fluctuations in energy consumption across networks can help detect and protect critical IT infrastructure from hackers.

2022-03-10

Twitter Joins Ukraine’s War Effort

Twitter has been a powerful weapon in many conflicts, used to spread propaganda & fake news. Now, it has picked a side and will defend Ukraine.

2022-03-10

A Cyber Attack On NATO Could Trigger Article 5

In the era of 'hybrid warfare' will NATO respond to a cyber attack on a member state in the same way as it would to an armed miiltary attack?

2022-03-09

Making Sense Of The Edge

Manufacturing’s big data has quickly become colossal, and Edge Computing can perform a vital role in the modern smart factory. By Martyn Williams

2022-03-08

Microsoft Exchange Exploited By ‘Cuba’

The Cuba ransomware gang target vulnerabilities on public-facing Microsoft Exchange software to detect susceptible networks.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

OneLogin

OneLogin

OneLogin simplifies identity management with secure, one-click access,for employees, customers and partners, through all device types, to all enterprise cloud and on-premise applications.

PCI Pal

PCI Pal

PCI Pal’s secure cloud payment solutions are certified to the highest level of security by the leading card companies.

Torsion Information Security

Torsion Information Security

Torsion is an innovative information security and compliance engine, which runs either in the cloud or your data centre.

GuardianKey

GuardianKey

GuardianKey is a solution to protect systems against authentication attacks.

Cloudsine

Cloudsine

Cloudsine (formerly Banff Cyber Technologies) is a cloud technology company specializing in cloud adoption, security and innovation.

Electric Power Research Institute (EPRI)

Electric Power Research Institute (EPRI)

The Electric Power Research Institute’s Cyber Security Research Laboratory (CSRL) addresses the security issues of critical functions of electric utilities.

Area 1 Security

Area 1 Security

Area 1 is the only Pay-per-Phish solution in cyber security. And the only technology that blocks phishing attacks before they damage your business.

Converge Technology Solutions

Converge Technology Solutions

Converge Technology Solutions Corp. is a North American IT solution provider delivering advanced analytics, cloud, cybersecurity, and managed services solutions.

ClassNK Consulting Service (NKCS)

ClassNK Consulting Service (NKCS)

ClassNK Consulting provides consulting services to the maritime industry with a focus on safety, security and compliance.

Red Sky Alliance

Red Sky Alliance

Red Sky Alliance (Wapack Labs Corp) is a cyber threat intelligence firm that delivers proprietary intelligence data, analysis and in-depth strategic reporting.

1Password

1Password

1Password combines industry-leading security with award-winning design to bring private, secure, and user-friendly password management to everyone.

Orbus Software

Orbus Software

Orbus develops, markets and sells enterprise software which helps large, blue chip and government organisations across the globe to achieve digital transformation outcomes.

Soteria

Soteria

Soteria is a global leader in the development, integration and implementation of advanced cyber security, intelligence and IT solutions, delivering complete end-to-end solutions.

Abertay cyberQuarter

Abertay cyberQuarter

The Abertay cyberQuarter is a cybersecurity research and development centre housed within Abertay University.

UltraViolet Cyber

UltraViolet Cyber

UltraViolet is an industry leading tech-enabled managed security services company.

Point Wild

Point Wild

Point Wild is a holding company that acquires, integrates and manages a diverse portfolio of best-in-class cybersecurity brands for consumers and enterprises.