News

2021-02-17

New British Cyber Security Council

Going Professional: The new UK Cyber Security Council is intended to be the official national governing body on training and standards.

2021-02-17

A Successful Solar Winds Investigation

The Solar Winds hack was a systemic failure by the US security establishment. Now is the time for a quiet, forensic investigation. By Ronald Marks

2021-02-16

Spotless Data

Manufacturers need accurate, reliable and clean data to run their processes. But what is data hygiene and how is it achieved? By Neil Ballinger

2021-02-16

Myanmar’s Cyber Security Bill

Myanmar’s military coup leaders have produced a draconian cyber security bill that gives the government sweeping powers over the Internet.

2021-02-16

3D Secure Authentication: What Is it, And Why Do I Need It?

3D Secure Authentication uses layers of consumer and merchant information to provide additional security for online purchases. By George J Newton

2021-02-16

British Parliament Wakes Up To Huawei

British MPs warn the government to be proactive with legislation on emerging technologies and learn from its flip-flop over Huawei's 5G system.

2021-02-15

Get Your Cyber Security Plan In Place Now

A cyber threat intelligence plan is more important than ever and now is the time for all organisations to sort out their cyber security strategy.

2021-02-12

5G Will Disrupt Cyber Security

The transition to 5G will enable the connection of billions of new devices and means an overhaul of infrastructure.The stakes could not be higher.

2021-02-12

Hiring Good Cyber Security Professionals Is Hard Work

Concerns over inadequately qualified cyber security job applicants persist, even as demand to fill increasingly well-paid jobs remains strong.

2021-02-12

Instagram, TikTok & Twitter Shutdown Stolen Accounts

The big social media companies work together to frustrate the theft and re-sale of high-value usernames on the OGUsers cyber crime market.

2021-02-11

Cyber Security In Higher Education

In both culture and technology, universities are among the most open and outward facing sectors. Unfortunately, this makes things easy for attackers.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Intruder

Intruder

Intruder is a cloud-based vulnerability scanner that finds cyber security weaknesses in your digital infrastructure, to avoid costly data breaches.

Security Onion Solutions

Security Onion Solutions

Security Onion Solutions is the creator and maintainer of Security Onion, a free and open platform for threat hunting, network security monitoring, and log management.

Early Warning Services

Early Warning Services

Early Warning is committed to providing awareness, education, and enablement around fraud prevention.

VMRay

VMRay

VMRay delivers advanced threat analysis and detection that combines a unique agentless hypervisor-based network sandbox with a real-time reputation engine.

Prove & Run

Prove & Run

Prove & Run provides a patented software development toolchain that is specifically forged to deal with the complex security properties of sensitive software components.

Morphus Information Security

Morphus Information Security

Morphus is an information security company providing Red Team, Blue Team and GRC services as well as conducting research in cybersecurity and threat analysis.

IT Security Jobs

IT Security Jobs

IT Security Jobs is a dedicated portal for everything related to IT professionals looking for IT Security jobs.

HCC Embedded

HCC Embedded

HCC’s mission is to ensure that data stored or communicated by an embedded IoT application is secure, safe and reliable.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

CyberPeace Foundation

CyberPeace Foundation

CPF is a think tank of cybersecurity and policy experts with the vision of pioneering Cyber Peace Initiatives to build collective resiliency against CyberCrimes and global threats of cyber warfare.

CyberLab

CyberLab

CyberLab (formerly Chess) is a specialist cyber security company that provides a wide range of security solutions and services.

OpenAVN (DefenseArk)

OpenAVN (DefenseArk)

Defending your life online, keeping your data safe and private. We detect digital threats magnitudes faster than the leading antivirus software.

Swish Data Corp.

Swish Data Corp.

Swish delivers when the problems are complex, requirements are difficult, and the mission is absolutely critical.

ScamAdvisor

ScamAdvisor

ScamAdviser helps over 3 million consumers every month to discover if a website is legitimate or a possible scam.

Bridgenet Solutions

Bridgenet Solutions

Bridgenet specialises as a top-notch Information and Technology Solutions Provider for businesses.

Innerworks

Innerworks

Innerworks intelligent bot detection. Innerworks is building the future of behavioural data on web3.