News

2020-11-02

Cyber Spying Laws Are Changing

Important legal rulings in Britain and the USA show how important it is for business to keep up with and understand national IT & data security laws.

2020-10-30

Five Things Management Must Know About Cyber Security

Cyber threats advance more quickly than many organisations can keep up with. It has never been more important for business leaders to take action.

2020-10-30

Nearly Half Of All Businesses Have No Protection

Two new pieces of research confirm the shocking levels of ignorance and complacency which leave so many business exposed to cyber attack.

2020-10-29

Amazon Sacks Employee Over Data Violation

Employees of Amazon’s Smart Doorbell product department used their account permissions to access video surveillance data of some customers.

2020-10-28

Cyber Professionals Fear Being Replaced By AI

Survey: Young cyber security professionals are happy in their jobs, but much more concerned about the impact of AI than their older colleagues.

2020-10-28

Ireland's Privacy Regulator Is Investigating Instagram

Facebook could get a huge EU fine after the Irish Data Protection Commission investigation of how Instagram handles childrens' contact data.

2020-10-28

Malware Versus Ransomware: What’s the Difference?

The decision to pay a ransom demand should not be taken lightly. If you do decide to pay, there are some things you should know. By Harman Singh

2020-10-27

Anticipating Cyber Attacks

Cyber security teams need to shift their focus inside the network and implement tools that help detect cyber attacks as early as possible.

2020-10-27

Russia's Hackers Are Masters Of Cyber Warfare

The British and US indictments of the 'Sandworm' group of military hackers reveals the extensive reach and power of professional cyber soldiers.

2020-10-27

Big Regulatory Changes In Store For The Internet

The US and the EU intend to bring in heavy regulation of tech markets which will have long term consequences for how the internet operates.

2020-10-26

The Big US Tech Corporations Are A ‘Monopoly of Power’

US Legislators are advocating massive changes that would lead to the regulatory disintegration of some of largest US tech companies.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Akin Gump Strauss Hauer & Feld

Akin Gump Strauss Hauer & Feld

Akin is a leading global law firm providing innovative legal services and business solutions to individuals and institutions. Practice areas include Cybersecurity, Privacy and Data Protection.

Seclore

Seclore

Seclore is the most advanced, secure, and automated Enterprise Digital Rights Management (EDRM) solution available.

Minerva Labs

Minerva Labs

Minerva’s patent pending solution keeps malware in a constant sleep state before it can infiltrate your network and cause any damage.

SRI International

SRI International

SRI International is a research institute performing client-sponsored R&D in a broad range of study areas including computing and cybersecurity.

Fraunhofer Institute for Secure Information Technology (SIT)

Fraunhofer Institute for Secure Information Technology (SIT)

Fraunhofer SIT is a research centre specialising in all areas of IT security.

PCI Compliance Guide

PCI Compliance Guide

The PCI Compliance Guide is one of the leading educational websites available focused exclusively on PCI compliance.

Advisen

Advisen

Advisen is the leading provider of data, media, and technology solutions for the commercial property and casualty insurance market including cyber risk.

Plixer

Plixer

Plixer delivers a network traffic analytics system used for monitoring, visualization, and reporting of network and security incidents.

SecureMetric Technology

SecureMetric Technology

SecureMetric is one of SE Asia’s leading players in the field of digital security with a focus on Software Licensing Protection, 2-Factor Authentication, Advanced Identity and Access Management, Publi

Automation & Cyber Solutions (ACS)

Automation & Cyber Solutions (ACS)

Automation & Cyber Solutions delivers a range of Industrial Automation and Cyber solutions & services to sectors including Oil & Gas, Chemicals & Petrochemicals, Power and others.

Sandia National Laboratories

Sandia National Laboratories

Sandia National Laboratories is a premier science and engineering lab for national security and technology innovation.

ETSI

ETSI

ETSI is a European Standards Organization dealing with telecommunications, broadcasting and other electronic communications networks and services including cybersecurity.

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance provides an array of cybersecurity services including cybersecurity policy management, risk assessments and regulatory compliance consulting.

In Fidem

In Fidem

In Fidem specializes in information security management, with a bold approach that views cybersecurity as a springboard to organizational transformation rather than a barrier to innovation.

ImmuniWeb

ImmuniWeb

We Simplify, Accelerate and Reduce Costs of Security Testing, Protection and Compliance.

Capzul

Capzul

Capzul are transforming the network security landscape with a new approach; creating virtually impenetrable networks, precluding cybercriminal attacks on your network ecosystem.