News

2019-07-17

The Cyber Effects Of Industry 4.0 On Warfare

We are experiencing the next Industrial revolution and the effects are changing geo-politics, military tactics & warfare. By Alfred Rolington

2019-07-16

AI Solves Beatles Songwriting Dispute

Was it John Lennon or Paul McCartney? An algorithm has learned to read musical fingerprints to help resolve arguments over a song’s origins.

2019-07-16

Croatian Government Targeted By Mystery Hackers

Croatian officials are spear-phished with an innovative technique that looks like the malware distribution platform used to disrupt Crimea.

2019-07-16

Vietnam’s Top Hacking Group Uses Sloppy Code

OceanLotus group is notorious for using carefully crafted tools to breach Vietnamese companies in the manufacturing and hospitality sectors.

2019-07-15

India & Japan In Cyber Security Pact

India and Japan have decided to collaborate in the areas of cyber security and outer-space as part of their growing security partnership.

2019-07-15

Five Ways HR Can Improve Cyber Security

It's not just an IT responsibility. HR professionals need to ensure employees’ skills are updated to encompass cyber security.

2019-07-15

Cyber Essentials For Board Directors

Most Board Directors now realise that Cyber-Threats risk serious damage and that Cyber Security must be regularly assessed. Don't they?

2019-07-12

2019: Cybersecurity Is In Crisis

After 6 months of data breaches, supply chain manipulations & state-backed hacking campaigns, some say the worst of 2019 is yet to come.

2019-07-11

BA Faces £183m Data Breach Fine

British Airways will be fined the biggest penalty handed out by the UK regulator so far and the first one to be made public under new GDPR rules.

2019-07-11

Wanted: Clarity About Cyber Insurance Cover

Lloyd’s of London wants all insurance policies to explicitly state whether coverage will be provided for losses caused by a cyber-attack.

2019-07-11

US Electoral Infrastructure Is Wide Open To Hackers

Most US electronic voting systems are nothing but bare-bone, decade old computer systems that lack even rudimentary endpoint security.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Certes

Certes

Certes is a pioneer in delivering cutting-edge security technology solutions, with a specific focus on Data Protection Risk Mitigation (DPRM).

VdS

VdS

VdS is an independent safety and security testing institution. Cybersecurity services include standards, audit/assessment and certification for SMEs.

Retail & Hospitality Information Sharing & Analysis Center (RH-ISAC)

Retail & Hospitality Information Sharing & Analysis Center (RH-ISAC)

Retail & Hospitality ISAC operates as a central hub for sharing sector-specific cyber security information and intelligence.

Trust in Digital Life (TDL)

Trust in Digital Life (TDL)

TDL is a membership association comprising companies, SMEs, universities and research institutes who exchange experience and insights to make digital services in Europe trustworthy and safe.

GeoLang

GeoLang

GeoLang’s Ascema platform protects sensitive information at the content level by identifying, classifying and tracking data across the corporate infrastructure.

Bluink

Bluink

Bluink specializes in identity and access management and customer identity verification, using your smartphone as a strong authenticator and secure identity store.

Mitre ATT&CK

Mitre ATT&CK

MITRE ATT&CK™ is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.

BwCIRT

BwCIRT

BwCIRT is the Computer Incident Response Team (CIRT) for Botswana and provides an official point of contact for dealing with computer security incidents.

Data Theorem

Data Theorem

Data Theorem is a leading provider in modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere.

Bitcrack

Bitcrack

Bitcrack Cyber Security helps your company understand and defend your threat landscape using our key experience and skills in cybersecurity, threat mitigation and risk.

SIA Group

SIA Group

SIA Group, an Indra company, combines Consulting, Systems Integration and Managed Services in four specialized business areas: Information Security, Storage, IT Management and IT Mobility.

SE Ventures

SE Ventures

SE Ventures provides capital to big ideas and bold entrepreneurs who can benefit from Schneider Electric's deep domain expertise, R&D assets, and global customer base.

NormCyber

NormCyber

NormCyber provide award-winning cyber security and data protection as a service for midsize organisations.

AuthX

AuthX

AuthX provides secure and seamless log-in capabilities through strong authentication and integrations.

Hicomply

Hicomply

Hicomply simplifies compliance management with smart, user-friendly tools, helping you scale your processes and stay in control - no matter how complex.

Cyvore Security

Cyvore Security

Cyvore combines cutting-edge AI, machine learning, and behavioral analytics to detect, investigate, and neutralize threats before they compromise your organization.