News

2019-11-15

The Future Of Cybersecurity Jobs

The rate of growth for jobs in information security is projected at 37% from 2012–2022, which is much faster than the average of all other careers.

2019-11-13

British Elections: Labour Party Suffers Second Attack

The Labour Party election campaign has experienced two large-scale cyber attacks by hackers on its digital platforms this week.

2019-11-12

Closing The Skills Gap Starts At School

Half of UK businesses are facing a basic technical cyber security skills gap, falling as low as 18% in the public sector. Schools hold the answer.

2019-11-12

BBC Goes To The Darkside On Tor

Some BBC Foreign language services including BBC Arabic, BBC Persian & BBC Russian will soon be available on TOR to get round censorship.

2019-11-12

Ransomware, Phishing And Botnets

Webroot has released its annual 'Nastiest Malware' list, shedding light on a number 2019’s worst cyber security threats.

2019-11-13

Artificial Intelligence & The Ethics Of War

Responsible, Equitable, Traceable, Reliable, Governable: The Pentagon has produced its first Ethical Code to govern the military use of AI.

2019-11-11

WEF Report Confirms Cyber Attack Risk Is Growing Worldwide

Form-jacking, crypto-jacking, ransomware and other cyber-attacks represent the greatest risks in six out of ten of the top economies in the world.

2019-11-11

Cyber Insurance Might Actually Encourage Attacks

Has cyber insurance responded to increased threat levels by expanding coverage to adapt to the full consequences that companies can suffer?

2019-11-11

Tech Giants Have Facilitated An Online Slavery Market

An undercover BBC Arabic investigation has found that domestic workers are being illegally bought and sold online in a booming black market.

2019-11-11

Cyber Crime Is An Increasing Risk For Charities

Cyber crime is a greater risk to the charity sector than other sectors and smaller organisations are particularly vulnerable.

2019-11-08

Fake News Generated Against Hong Kong Protesters

Discovered: A coordinated network of activities by China that spread disinformation on social media about the mass protests in Hong Kong.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

F5 Networks

F5 Networks

F5 products ensure that network applications are always secure and perform the way they should—anywhere, any time, and on any device.

VADO Security Technologies

VADO Security Technologies

VADO Security enables the safe transfer of data between low & high security networks.

CARICERT

CARICERT

CARICERT is the National Cyber Emergency Response Team of Curacao in the Caribbean.

Jumio

Jumio

Jumio’s end-to-end identity verification and authentication solutions fight fraud, maintain compliance and onboard good customers faster.

CyBOK - University of Bristol

CyBOK - University of Bristol

CyBOK is a comprehensive Body of Knowledge to inform and underpin education and professional training for the cyber security sector.

aDolus Technology

aDolus Technology

aDolus delivers a robust solution for safeguarding against counterfeit or malicious software and firmware in mission-critical systems.

Verificient Technologies

Verificient Technologies

Verificient Technologies specializes in biometrics, computer vision, and machine learning to deliver world-class solutions in continuous identity verification and remote monitoring.

Scythe

Scythe

SCYTHE is a next generation red team platform for continuous and realistic enterprise risk assessments.

Blackfoot Cybersecurity

Blackfoot Cybersecurity

At Blackfoot, we work in partnership with you to deliver on-demand cyber security expertise and assurance, keeping you one step ahead of threats & compliant with regulations.

Stealth Software Technologies

Stealth Software Technologies

Stealth Software Technologies is focused on the generation of research and software products focused on applied cryptography and cybersecurity.

Stratum Security

Stratum Security

Stratum Security is an information security consulting company that focuses on providing clear and concise risk guidance to its clients through high quality assessment services.

Securd

Securd

Securd takes opportunities away from your cyber adversaries. Cloud-delivered zero-trust DNS firewall and web filtering protection keep your business network and remote employees safe.

Kocho

Kocho

Kocho (formerly TiG) is a provider of identity and access, cyber security, cloud transformation, and managed IT services.

ALSCO

ALSCO

ALSCO is dedicated to bringing first class IT services, technical support, and solutions to goverment, companies and organizations worldwide.

Judy Security

Judy Security

Judy (formerly AaDya Security) provides smart, simple, effective, all-in-one cybersecurity for SMBs. Get the 24/7 protection and support you deserve, at a price you can afford.

Dynamic Standards International (DSI)

Dynamic Standards International (DSI)

Dynamic Standards International is a global standards development organization which develops certifiable ‘dynamic standards’ that pace with fast-evolving landscapes.