News

2018-12-10

Amazon Gets Into Blockchain

Amazon Go Large: AWS Managed Blockchain allows users you to set up and manage a scalable blockchain network with just a few clicks.

2018-12-06

Russia And Ukraine’s Crisis Could Escalate Beyond Cyberwar

The crisis triggered by the maritime clash in the Black Sea has brought widespread denunciations of Russian aggression. What happens next?

2018-12-07

What Makes Blockchain A New Security Standard?

As efforts to standardize the technology progress, blockchain could become a new security standard for many industries. By Mary Ann Callahan

2018-12-27

Cybersecurity 2019: Predictions You Can’t Ignore

Threat actors are not being deterred; expect more intensified and ever more sophisticated attacks in 2019.

2018-12-06

Fake Facebook Pages Account For 60% Of Social Network Phishing

Kaspersky's anti-phishing tools prevented 3.7m attempts to visit fraudulent social network pages in Q1. The majority were fake Facebook pages.

2018-12-06

Artificial Intelligence Or Deep Learning? What's The Difference?

AI, machine learning, and deep learning often overlap and are easily confused. Here's a concise guide.

2018-12-07

Surveillance Spyware Targeted At Journalists In Mexico

Colleagues of a journalist who was shot dead in Mexico last year were the targets of surveillance spyware a day later.

2018-12-05

GCHQ Doesn't Always Tell Vendors If Their Software Is Vulnerable

GCHQ has a special team to search for flaws in different types of computer software and systems. They don't always disclose what they find.

2018-12-04

Russian Hackers Are Using Brexit To Leverage Cyber Attacks

The Fancy Bear hacking team is using Brexit in an effort to trick target institutions across the EU into opening emails and downloading malware.

2018-12-03

Marriott Hack- 500m Data Records Exposed

Hackers exfiltrated data on 500m customers, thought to include payment card details, name & address, along with the system encryption keys.

2018-12-05

AI Will Create Employment And Generate New Skills

AI and automation will open the door for scores of new job opportunities, many of which we can’t yet imagine.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

QinetiQ

QinetiQ

QinetiQ is one of the world's leading defence technology and security companies. Areas of activity include air, land, sea and space systems, weapons, robotics, C4ISR and cyber security.

LogRhythm

LogRhythm

LogRhythm's security platform unifies SIEM, log management, network and endpoint monitoring, user behaviour analytics, security automation and advanced security analytics.

Pyramid Computer

Pyramid Computer

Pyramid Computer provides custom enterprise solutions for Industrial PC, Imaging, Network, Security, POS, Indoor Positioning and Automation.

Redbud

Redbud

Redbud is a specialist search and recruitment firm for Information Security professionals.

Claroty

Claroty

Claroty was conceived to secure and optimize OT networks that run the world’s most critical infrastructures.

ThreatAware

ThreatAware

Total visibility of your business cybersecurity. Monitoring, management and compliance for your cybersecurity tools, people and processes from one easy to use dashboard.

CyberSaint Security

CyberSaint Security

CyberSaint’s CyberStrong Platform empowers organizations to implement automated, intelligent cybersecurity compliance and risk management.

TRU Staffing Partners

TRU Staffing Partners

TRU Staffing Partners is an award-winning contract staffing and executive search firm for cybersecurity, eDiscovery and privacy companies and professionals.

Airtel Secure

Airtel Secure

Airtel Secure’s multi-layered, full service cybersecurity offerings are designed to safeguard enterprises against threats of various kinds and origins.

Island

Island

Island puts the enterprise in complete control of the browser, delivering a level of governance, visibility, and productivity that simply weren’t possible before.

FCI

FCI

FCI is a NIST-Based Managed Security Service Provider (MSSP) offering Cybersecurity Compliance Enablement Technologies & Services to Financial Services organizations.

Rezonate

Rezonate

Rezonate discovers, profiles, and protects Identities and their entire access journey to cloud infrastructure and critical SaaS applications. Preventing and stopping cyberattacks.

Millennium Corporation

Millennium Corporation

For nearly two decades, Millennium Corporation has been operating on the leading edge of cybersecurity.

ZEUSS

ZEUSS

ZEUSS is a diversified data center, cybersecurity, and green energy company.

DHCO IT

DHCO IT

The DHCO IT team are experts in IT support, cyber security, cloud support and disaster recovery, and are Microsoft 365 partners.

HP Wolf Security

HP Wolf Security

HP Wolf Security protects your organization and devices from cyberattacks no matter where, when or how you work.