News

2020-03-11

Facial Recognition Company Hacked

Clearview, who use cutting edge facial recognition software which has recorded over 3 billion personal images, has suffered a major breach.

2020-03-19

The Hot Jobs In Cyber Security & How To Get One

In a comparatively new career path, it is already clear that the hot jobs in cyber security are linked with a demand for analytical skills.

2020-03-18

An Escalating Cyber-Espionage Campaign In The Middle East

Governmental organisations in Turkey, Jordan and Iraq are being targeted in a growing campaign to gather intelligence. Who would do that?

2020-03-03

Where Is Iran's Cyber Response To It's General's Assassination?

Iran's threatened response to the US killing of their top military leader has yes to materialise, although their state- sponsored hackers are busy.

2020-03-18

Cyber Attacks Predicted For 2020 Summer Olympics

Supply Chain: The IOC is anxious to ensure that every third party organisation involved in the 2020 Games has adequate cyber security systems.

2020-03-17

New UK Cyber Force Targets Terror Groups

At Last: A specialist British cyber force of military & civilian hackers who can target hostile states and terror groups is ready to get going.

2020-03-17

Why 5G Is Going To Quickly Replace 4G

5G will unlock new applications that were simply not possible with 4G. Specifically, workplaces will no longer be defined by a physical location.

2020-03-06

Ransomware Attack On US Power Station

A major cyber-attack has hit a US gas compression facility, forcing it to shut it down for two days as it struggled to recover.

2020-03-03

Mexico’s Economy Ministry Falls Under Attack

Following damaging attacks on the banking system and the oil industry, the Mexican Government now finds itself a target for hackers.

2020-03-02

The Pope Speaks Out On The Ethics Of AI

The Vatican, the European Union and some of the most important technology companies agree that Artificial Intelligence needs an ethical dimension.

2020-03-02

Top Cybersecurity Threats & Solutions To Empower Every Business

It’s high time for businesses to get serious about cybersecurity and protect assets and clients. By Naomi Hodges of Surfshark

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TrustedSec

TrustedSec

TrustedSec is an information security consulting services, providing tailored solutions and services for small, mid, and large businesses.

Mocana

Mocana

Mocana provides a software platform that allows you to develop, test and distribute more secure IoT devices and services.

Exabeam

Exabeam

Exabeam is a global cybersecurity leader that delivers AI-driven security operations.

Pradeo

Pradeo

Pradeo Security offers a complete, automatic and seamless protection to mobile devices and applications, aligned with your organization security policy while preserving business agility.

Information Technology & Cyber ​​Security Service (STISC) - Moldova

Information Technology & Cyber ​​Security Service (STISC) - Moldova

STISC is a public institution whose purpose is to ensure the administration, maintenance and development of the information technology infrastructure in Moldova.

SECURITI.ai

SECURITI.ai

SECURITI.ai's PrivacyOps platform is a full-stack solution that operationalizes and simplifies privacy compliance using robotic automation and a natural language interface.

Dataprovider.com

Dataprovider.com

Our Brand Protection Suite gives you the tools to discover trademark infringement on the Internet, such as websites selling counterfeit products, even when this is not immediately noticeable.

Nominet

Nominet

Nominet's cyber division offers network detection and response services to governments and enterprises worldwide.

Stratum Security

Stratum Security

Stratum Security is an information security consulting company that focuses on providing clear and concise risk guidance to its clients through high quality assessment services.

OpenAVN (DefenseArk)

OpenAVN (DefenseArk)

Defending your life online, keeping your data safe and private. We detect digital threats magnitudes faster than the leading antivirus software.

Lancera

Lancera

Lancera provides growth accelerating Software Development, Web Presence and Cybersecurity Solutions with a focus on customer happiness.

DigitalWell

DigitalWell

DigitalWell provide fully managed IT and communications solutions for a truly innovative end-to-end experience - for your customers and teams.

BlueCat Networks

BlueCat Networks

BlueCat is the Adaptive DNS company. Our mission is to help the world’s largest organizations thrive on network complexity, from the edge to the core.

Threatsys Technologies

Threatsys Technologies

Threatsys’s Integrated cyber security process helps your organizations to ensure that it’s secure from any fraudulent attacks.

CyberForce Global

CyberForce Global

CyberForce Global are at the forefront of start-up technology recruitment in areas including cybersecurity, IT infrastructure, software, fintech, blockchain and more.

ThingsRecon

ThingsRecon

ThingsRecon empowers organisations to continuously map and manage their attack surface, uncover hidden vulnerabilities, and assess supplier cyber hygiene.