News

2018-11-20

How Companies Can Minimise Cyber Attack Damage

Cyber criminals can often exploit security breaches over months and sometimes even years and that can be very damaging to any organisation.

2018-11-16

Don't Underestimate The Impact Of Phishing

Most companies lack adequate safeguards against phishing threats and its not just about emails.

2018-11-15

Good News About Voting Security

America’s election infrastructure has never been more carefully monitored in the weeks, and months leading up to the nationwide vote.

2018-11-14

Darktrace Describe The Alarming Future AI Attack Scenario

AI-driven malware that will self-propagate via a series of autonomous decisions, intelligently tailored to the parameters of the infected system.

2018-11-14

Dozens of Spies Killed Thanks To Flawed CIA Comms System

A catastrophic chain of events led to 70% of the CIA’s spy network in Iran being potentially compromised at some point between 2009-13.

2018-11-15

Neither US, Russia Or China Will Sign Macron's Cyber Pact

Three of today's major cyber-powers have not signed an agreement on rules and principles proposed by French President Emmanuel Macron.

2018-11-13

Schoolboy Hacked Mock Florida Election Site In 10 Minutes

As votes cast in Florida are re-counted amid allegations of electoral fraud, it turns out that an 11 year old could hack the state's system.

2018-11-14

Why The Public Directory Of Domain Names Is About To Vanish

Until May 2018, anyone could look up the name and contact details for the owner of a domain name. Not any more. By Emily Taylor

2018-11-14

Can AI Be Used To Fight Crime?

AI is now sophisticated enough to offer police the tools to solve previous crimes while helping to prevent of crimes yet to take place. By Bill Hess

2018-11-15

Companies Are Dropping The Term ‘Blockchain’ Due To Hype

A new report states that some companies are stopping using the term “blockchain” because they think it is overhyped.

2018-11-20

What Is Blockchain Technology?

Blockchain technology, for all its merits, is not a new technology. Rather, it is a combination of proven technologies applied in a new way.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Mellanox Technologies

Mellanox Technologies

Mellanox Technologies is a leading supplier of end-to-end Ethernet and InfiniBand intelligent interconnect solutions and services for servers, storage, and hyper-converged infrastructure.

Datto

Datto

Datto delivers a single toolbox of easy to use products and services designed specifically for managed service providers and the businesses they serve.

Raz-Lee Security

Raz-Lee Security

Raz-Lee Security is the leading security solution provider for IBM Power i, otherwise known as iSeries or AS/400 servers.

ComCERT

ComCERT

ComCERT SA is an independent, private consulting company focusing in the assistance of its customers facing the dangers of cyber threats and security incidents.

Barbara IoT

Barbara IoT

Barbara is an industrial device platform specifically designed for IoT deployments.

Secure IT Disposals

Secure IT Disposals

Secure IT Disposals specialise in professional Computer Recycling, Computer Disposals, Computer Destruction, Data Erasure and end-of-lifecycle solutions.

DCX Technology

DCX Technology

Recognized as a leader in security services, DXC Technology help clients prevent potential attack pathways, reduce cyber risk and improve threat detection and incident response.

Dataprovider.com

Dataprovider.com

Our Brand Protection Suite gives you the tools to discover trademark infringement on the Internet, such as websites selling counterfeit products, even when this is not immediately noticeable.

Sovereign Intelligence

Sovereign Intelligence

Sovereign Intelligence provides automated insight into the relative intensity of hidden Cyber, Brand, and Financial Risks to your company.

Cyber Protection Group (CPG)

Cyber Protection Group (CPG)

Cyber protection Group specialize in Penetration Testing. We work with enterprise level companies as well as small to medium sized businesses.

BaXian Group

BaXian Group

BaXian AG is an international consulting company specializing in IT security, data analytics, risk management and compliance.

AdvIntel

AdvIntel

AdvIntel is a next-generation threat prevention and loss prevention company launched by a team of certified investigators, reverse engineers, and security experts.

Circle Security

Circle Security

Circle’s breakthrough security API unifies solutions for identity and data security into one architecture and empowers organizations to secure their identity, data and privacy in their applications.

CyberXposure

CyberXposure

CyberXposure has been built by a team comprising of Cyber Security Professionals and SAAS experts in data backup, disaster recovery and cyber-security.

Hummingbird International

Hummingbird International

Hummingbird International, LLC offers services for the collection, audit, computer recycling and safe disposal of laptops, monitor/LCD, hard drives, and IT disposal.

VeriBOM

VeriBOM

VeriBOM is a SaaS security and compliance platform that helps protect you and your customers through automation, documentation, and transparency for every software application you build or run.