News

2018-12-19

US Senator Calls For New Cyber Doctrine

Sen. Mark Warner calls for a new US cyber doctrine designed to combat modern threats from hackers and disinformation campaigns.

2018-12-18

Three Ways Facebook Could Clean Up Its Act

Facebook, Twitter and other social media companies are causing society-wide damage. Here are three ideas to reduce the harm they do.

2018-12-14

Edward Snowden Calls For Google To Stay Out Of China

Edward Snowden adds his voice to human rights groups asking Google to back out of its plans to launch a censored search engine in China.

2018-12-17

Insurance: Common Cyber Security Myths

We look at the myths around cyber insurance and ask the million-dollar question: can your business afford not to have it?

2018-12-13

Hackers Step Out Of The Shadows With Bigger, Bolder Attacks

Stealth and secrecy used to be the hallmarks of cyber warfare. But increasingly, cyber attacks are now carried out in full public view.

2018-12-14

Indian Government To Provide Handbook On Cyber Safety To School Children

The booklet on cyber safety for teenagers tries to address the increased use of smartphones, gadgets, online gaming and social media.

2018-12-13

Supply Chain Attacks Are On The Rise

Third-party vendors and suppliers are insiders too. They need to be included in the corporate Insider threat Program. By Marcell Gogan

2018-12-14

Top 8 Most Disturbing Data Breaches In 2018

Take a closer look at some of the major 2018 data breaches and discover why they happened. By Marcell Gogan

2018-12-11

British Telecom Is Stripping Huawei Out Of Its Network

BT is to strip all Huawei equipment from its core 4G network and prevent the Chinese equipment vendor from bidding for core 5G network contracts.

2018-12-14

Waymo Is First With Driverless Car Service

Waymo is reportedly planning to launch the world’s first commercial driverless car service this month (December 2018).

2018-12-18

Cyber Weapons Are Proliferating Beyond Control

Cybersecurity is quickly moving beyond the pure financial impact to concerns over public safety, national security and even cyberwarfare.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Trusted Computing Group

Trusted Computing Group

TCG was formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms.

Clari5

Clari5

Clari5 redefines real-time, cross channel banking Enterprise Fraud Management using a central nervous system approach to fight financial crime.

Italtel

Italtel

Italtel is a multinational ICT company that combines networks and communications services with the ability to innovate and develop solutions for digital transformation.

Q-Net Security

Q-Net Security

Protect your critical networks. Q-Net Security make hardware that provides the strongest drop-in security for your existing critical infrastructure.

Thrive

Thrive

Thrive delivers the experience, resources, and expertise needed to create a comprehensive cyber security plan that covers your vital data, SaaS applications, end users, and critical infrastructure.

Commonwealth Cyber Initiative (CCI)

Commonwealth Cyber Initiative (CCI)

The Commonwealth Cyber Initiative is establishing Virginia as a global center of excellence at the intersection of security, autonomous systems, and data.

Thistle Technologies

Thistle Technologies

Thistle Technologies is building tools that help connected device manufacturers build security resiliency into devices.

Clear Skye

Clear Skye

Clear Skye, an Identity Access and Management (IAM) software company, reimagines enterprise identity access and risk management software to make a complicated problem easier to manage.

Noetic Cyber

Noetic Cyber

Noetic provides a proactive approach to cyber asset and controls management, empowering security teams to see, understand, and optimize their cybersecurity posture.

Mandiant

Mandiant

Mandiant deliver dynamic cyber defense solutions powered by industry-leading expertise, intelligence and innovative technology.

Advantage

Advantage

Advantage exists to provide peace of mind in an evolving technology reliant world. We were created by visionaries who for nearly 4-decades have been passionate about providing world-class solutions.

Cyber Octet

Cyber Octet

Cyber Octet is an IT Solution, Security, Training and Services company. We provide training and services from Web Application Security to ISO 27001 implementation.

Collabera Digital

Collabera Digital

Collabera Digital engineer the next generation of solutions that power tech-forward organizations and create an impact on people and communities.

Infima Cybersecurity

Infima Cybersecurity

INFIMA tackle the hard parts of managing your Security Awareness Training program so you can focus elsewhere.

Yondu

Yondu

Yondu empowers businesses across various industries through a wide array of innovative technology solutions to help them scale in the new digital economy.

Securitribe

Securitribe

Securitribe provides cybersecurity and compliance solutions, including vCISO services, ISO27001, and ASD Essential 8 advisory, helping businesses and government strengthen security & compliance.