News

2019-09-04

Easy Cyber Knowledge Chapter 3 - Social Media & Social Change

A revolution is taking place that will significantly change us as individuals, the way we live and our engagement with others. By Alfred Rolington

2019-09-03

Proactivity Is Key To Effective Cybersecurity

Decision-makers need to plan for the worst and know what to do when an incident occurs.

2019-09-03

Maritime Shipping Is Badly Exposed

Ships at sea are operating without effective cyber security measures in place, exposing critical vessel control systems to vulnerabilities.

2019-09-03

Extra-Terrestrial Hacking

NASA is reportedly investigating one of its astronauts in a case that appears to involve the first allegations of criminal hacking from space.

2019-09-04

Seven Cybersecurity Issues That Easily Go Unnoticed

Some cybersecurity issues and challenges can be harder to spot than others and it can lead to problems going unnoticed. By Chester Avey

2019-09-02

One $Million Stolen Every Minute

Every 60 seconds, 1,861 people in the USA are hit by cyber crimes and some states are much more risky than others. Alaska is a real hot spot.

2019-09-02

Five Features Of The Changing Threat Landscape

Organisations and critical infrastructure are likely to experience far more-destructive cyber-attacks, according to Accenture's 2019 Threat Report.

2019-09-02

Cyber Weapons Could Create Devastation Comparable To A Nuclear Strike

Cyber threats could be just as dangerous as a nuclear conflict, yet this is little understood by some governments and the public at large.

2019-09-02

A Major Breach In Biometrics Security Database

BioStar: Over a million fingerprints and other sensitive data including unencrypted usernames and passwords have been found exposed online.

2019-08-30

US Cyber Attack Disabled Iran’s Ability To Target Shipping

A strike by US CyberCommand has disabled a critical Iranian intelligence database, diminishing their ability to conduct covert attacks.

2019-08-30

One in Four Workers Would Steal Company Information

A quarter of IT employees surveyed say they would take company information to help apply for a job with a competitor.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Feedzai

Feedzai

Feedzai provide software that uses big data analysis and machine-based learning to prevent fraud in ecommerce.

CFC Underwriting

CFC Underwriting

CFC is a specialist insurance provider and a pioneer in emerging risk, including cyber insurance.

IMS Networks

IMS Networks

IMS Networks specializes in the design and management of high criticality networks and telecoms services including network security and Managed Security Services.

National Cyber and Information Security Agency (NUKIB) - Czech Republic

National Cyber and Information Security Agency (NUKIB) - Czech Republic

NUKIB is the central Czech government body for cyber security, the protection of classified information in the area of information and communication systems and cryptographic protection.

Bottomline Technologies

Bottomline Technologies

Bottomline Technologies is an innovator in business payment automation technology, helping companies make complex business payments simple, smart and secure.

Six Degrees

Six Degrees

Six Degrees is a leading secure, integrated cloud services provider. We protect UK organisations and help them thrive in the cloud by giving them secure platforms to innovate and grow.

Tutamantic

Tutamantic

Tutamantic develops software that reduces security risks and weaknesses during the architectural and design stages.

Tabidus Technology

Tabidus Technology

Tabidus Technology is a cybersecurity association that unites and provides the global protection options against cyber threats.

Otorio

Otorio

OTORIO delivers industrial cybersecurity and digital risk-management solutions and services. We help our customers to keep their revenue-generating operations resilient, efficient, and safe.

Dope Security

Dope Security

Dope Security is a fly-direct Secure Web Gateway that eliminates the data center stopover architecture required by legacy providers, instead performing security directly on the endpoint.

Kirk ISS

Kirk ISS

Kirk ISS are the leading provider of IT services in the Cayman Islands. We offer best-in class hardware, software, communications and cloud computing, all backed by professional services support.

Exalens

Exalens

With deep roots in AI-driven cyber-physical security research and intrusion detection, at Exalens, we are enhancing operational resilience for cyber-physical systems at the OT edge.

Q5id

Q5id

At Q5id, we prove that your customers' digital identity and real-world identity are the same, our verification and authentication solution delivers a Proven and Secure digital identity for everyone.

Cyber Security Council UAE

Cyber Security Council UAE

The Cyber Security Council's vision is to protect UAE cyberspace, maintain confidence in our digital infrastructure and institutions, and build a cyber-resilient society.

OneZero Solutions

OneZero Solutions

OneZero specialize in cybersecurity operations, information assurance, computer network operations, solutions engineering, and project management.

DataStealth

DataStealth

DataStealth is a data protection platform that allows organizations to discover, classify, and protect their most sensitive data and documents.