News

2021-03-03

US Cyber Security To Get A Much Needed Upgrade

The US is scrambling to upgrade its cyber defenses after the SolarWinds hack exposed government & corporate secrets to Russian spies.

2021-03-02

Five Steps For Managing EdTech Security Risks

EdTech companies have a special responsibilty to protect their users, who are mostly adolescents & children, from online threats. By Angela Baker

2021-03-01

Three Reasons The Security Industry Is Protecting The Wrong Thing

For too long organisations have been focusing on protecting their network, when they should have been protecting their data. By Paul German

2021-03-02

Russian Hackers Make A Sustained Attack On France

Leading French companies, government agencies and City authorities have fallen victim to a 'supply chain' attack similar in execution to SolarWinds.

2021-03-01

Microsoft Releases Free Tool For Hunting SolarWinds Malware

Microsoft is open-sourcing the CodeQL queries tool it used to investigate the impact of malware planted in the SolarWinds Orion software updates.

2021-02-26

New Solutions For Zero-Day Attacks

Emergency Patches: Defending against zero-day attacks is one of the most fundamentally challenging security problems yet to be solved.

2021-02-26

Social Media’s Troublesome Influence On Politics

Social media platform architectures are not primarily designed for democratic discourse, yet they are heavily used for political purposes.

2021-02-25

Australia Makes Google & Facebook Pay

Following an ugly confrontation, Google and Facebook are now required to negotiate with news outlets to pay for their content, or face arbitration.

2021-02-25

GCHQ Jammed ISIS Drones & Servers

A secret cyber operation which involved disabling drones, jamming mobile phones and targeting computer servers to block online propaganda.

2021-02-24

Cyber Security Is Crucial For Maritime Shipping

Cyber attacks targeting ocean transport are growing exponentially and present great risks to the safety of crews, vessels, cargoes and ports.

2021-02-23

Cyber Security Training Goes Gaming

A scenario-based, gamified learning tool that drives high levels of engagement through popular elements used widely in the video gaming world.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Phoenix TS

Phoenix TS

Phoenix TS offers world-class management, computer, and IT security certification training courses.

Electus Recruitment Solutions

Electus Recruitment Solutions

Electus is a leading recruitment specialist in the Engineering, Technology & Digital and Cyber & Security sectors.

Information Network Security Agency (INSA) - Ethiopia

Information Network Security Agency (INSA) - Ethiopia

INSA's vision is to realize a globally competent National Cyber capability which plays a key role in protecting the national interests of Ethiopia.

OneVisage

OneVisage

Our award-winning 3DAuth digital identity platform turns any consumer mobile device into a real-time 3D facial scanner that securely authenticates the user in seconds.

ThreatMark

ThreatMark

ThreatMark provides fraud detection solutions for digital banking and payments.

ADL Process

ADL Process

ADL Process offer secure data destruction, certified product destruction and responsible electronics recycling services to businesses and institutions.

Ockam

Ockam

Ockam gives you the tools you need to establish an architecture for trust within your connected device applications.

Protocol Labs

Protocol Labs

Protocol Labs is a research, development, and deployment institution for improving Internet technology.

National CyberWatch Center - USA

National CyberWatch Center - USA

National CyberWatch Center is a cybersecurity consortium working to advance cybersecurity education and strengthen the national workforce.

SecondWrite

SecondWrite

SecondWrite’s next-generation malware detection engine delivers a combination of automatic deep code inspection and accurate scoring of zero-day malware.

SHe CISO Exec

SHe CISO Exec

SHe CISO Exec is a sustainable global training and mentoring platform in information security and leadership.

Canopius Group

Canopius Group

Canopius is a global specialty lines insurance and reinsurance company and one of the top 10 insurers in the Lloyd’s insurance market.

TRU Staffing Partners

TRU Staffing Partners

TRU Staffing Partners is an award-winning contract staffing and executive search firm for cybersecurity, eDiscovery and privacy companies and professionals.

ISECURION Technology & Consulting

ISECURION Technology & Consulting

ISECURION is an information security consulting company. We provide a unique blend of services to our customers catering to the current information security landscape.

Buchanan & Edwards

Buchanan & Edwards

Buchanan & Edwards delivers forward-focused technology solutions that help our clients transform the way they perform their missions.

FOSSA

FOSSA

FOSSA is a leading SBOM (software bill of materials) and software supply chain risk management platform.