News

2019-12-17

Going To The Dark Web

If the Internet is an online world of towns and cities, then the Dark Web is the red-light district. It's growing and the Internet is changing with it.

2019-12-17

US Contractors Struggling With Pentagon Cyber Security Standards

A prime route for hackers intending to steal US government technology is targeting its industrial base via the lengthy and vulnerable supply chain.

2019-12-17

The Future Of Policing In A Cyber World

Police and criminals compete to get one step ahead of each other. How has the cyber threat landscape evolved and how can police respond?

2019-12-16

What Girls Bring To Cyber Security

Some educators think that females have particular skills to bring to cyber security and schools in New Jersey, US and Cardiff, Wales, back this up.

2019-12-16

Cybercrime’s Deadly Impact On Business

A single successful attack can seriously damage your business, cost big money, burden your customers and affect your business's reputation.

2019-12-13

Malware Is Stealing Hotel Guest Data

RevengeHotels is a targeted cybercrime malware campaign against hotels, hostels, hospitality and tourism companies.

2019-12-12

$5m Bounty For Russian Hacker

The FBI are offering an unprecedented $5 million reward for information leading to the arrest of the notorious bank hacker, Maksim Yakubets.

2019-12-11

Bitcoin, Murder & Mafia On “Blockchain Island”

An investment project to to mine the controversial cryptocurrency Bitcoin in the EU nation of Malta has been linked to a murder.

2019-12-11

A Massive Datacenter On Single Chip

A huge data center, which would use enormous amounts of energy to crunch data in a large building, can be placed on a single computer chip.

2019-12-10

Antivirus Software Concealed Thousands Of Cybercrime Reports

Over 9,000 reports of British cybercrime were not investigated because software designed to protect the Police database labelled them a security risk.

2019-12-10

Artificial Intelligence Is Already Reshaping Our Lives

AI is revolutionising how the everyday world works, including applications from streamlining operations to informing better decision making.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Hodgson Russ

Hodgson Russ

Hodgson Russ is a US business law firm. Practice areas include Privacy, Data Breach & Cybersecurity.

Conix

Conix

Conix offerings include Governance and Risk Management, Auditing and Penetration Testing, Digital Forensics, Managed Security Operations Centre (SOC).

Sensible Vision

Sensible Vision

SensibleVision helps organizations transparently protect data and prevent costly security breaches by constantly verifying the identities of people who use computers or mobile devices.

Neowave

Neowave

Neowave designs, manufactures and markets strong authentication solutions based on smart card components and digital certificates.

Quadible

Quadible

Quadible BehavAuth is an AI-platform that continuously authenticates the users, without the need of any input, by learning their behavioural patterns.

Pinpoint Search Group

Pinpoint Search Group

Pinpoint Search Group's recruiters specialize in Information Management, Cyber Security, Cloud and Robotic Process Automation (RPA).

Red Piranha

Red Piranha

Red Piranha's Crystal Eye Unified Threat Management Platform is designed for Managed Service Providers and corporations that need extreme security that is both easy to use and affordable.

Stealth-ISS Group

Stealth-ISS Group

Stealth–ISS Group is your extended IT, cyber security, risk and compliance team, providing strategic guidance, engineering and audit services, along with technical remediation and security operations.

Cyber Security for Europe (CyberSec4Europe)

Cyber Security for Europe (CyberSec4Europe)

CyberSec4Europe is designing, testing and demonstrating potential governance structures for a European Cybersecurity Competence Network.

GuardDog.ai

GuardDog.ai

guardDog.ai has developed a cloud-based software service with a companion device that work together to simplify network security.

NXTsoft

NXTsoft

NXTsoft’s solutions help businesses secure, connect and optimize their data to maximize revenue opportunities, enhance profitability, and mitigate cybersecurity risk.

Cynalytica

Cynalytica

Cynalytica deliver pioneering cybersecurity and machine analytics technologies that help protect critical infrastructure, securely enable Industry 4.0 and help accelerate digital transformation.

Retruster

Retruster

Protect your users against phishing emails, ransomware & fraud with the most advanced, user-friendly, non-intrusive solution available.

Fibernet

Fibernet

Fibernet's innovative solutions in the fields of cybersecurity and fiber optics range from telecommunications infrastructure to small business cybersecurity.

Cyber Proud

Cyber Proud

Cyber proud is leading a talent revolution to promote and create an inclusive skilled cyber workforce.

BSS

BSS

BSS is a solutions and services business based in the UK with a focus on Cyber Security, Data, Financial Crime, Internal Audit, Change, Risk and Resilience.