News

2018-09-05

How Blockchain Can Protect IoT Devices

IoT devices which are online all the time are especially vulnerable to cyberattack and could even be part of one. Blockchain can mitigate that.

2018-09-05

US Army Upgrades Cyber Protection Training

The US Army's cyber protection teams are upgrading their training program to include a real-life, round-the-clock, cyberattack on a city port.

2018-09-04

NATO Live-Fire Cyber Exercise

Locked Shields: With the cyber domain playing host to increased hostilities, NATO's readiness for attacks has never been more crucial.

2018-09-04

Cyber Insurance Has Distinctly Risky Characteristics

The danger of accumulation of cyber risks is a key concern for the insurance market, according to a study released by The Geneva Association.

2018-08-23

Catching The Silent Attacker, And The Next Phase Of Cyber AI

Lurking beneath the surface of enterprises today are subtle, stealthy cyber-threats – how can cyber AI fight back?

2018-09-04

Tomorrow’s Malware Will Attack When It Sees Your Face

AI may soon make malicious software nearly impossible to detect as it waits for just the right person to sit in front of the computer.

2018-09-03

Banks And Retailers Track How You Type, Swipe And Tap

To fight fraud, a growing number of banks and merchants are tracking visitors’ physical movements as they use websites and apps.

2018-09-03

Threat Posed By Satellite Systems

Satellite communications are vulnerable to hackers which, in the worst-case scenario, could turn satellite antennas into weapons.

2018-09-03

UK Police Fail To Take Digital Advantage

Embracing technology remains one of the biggest challenges facing UK police forces. It has already changed what criminals are able to do.

2018-08-22

Russian Military Spy Software Is On Home Routers

The Russian military is inside hundreds of thousands of routers owned by Americans and others around the world.

2018-08-21

Why Some Computer Viruses Refuse To Die

There are zombies on the internet - odd, undead lumps of code that roam endlessly seeking and finding fresh victims to infect.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Asigra

Asigra

Asigra provides an industry leading cloud backup and recovery software platform called Asigra Cloud Backup.

Planit Testing

Planit Testing

Planit is a leader in Quality Assurance and a specialist in software testing and training services.

IUCC Cyber Unit - Israel

IUCC Cyber Unit - Israel

IUCC Cyber Unit safeguards Israel’s National Research & Education Network (NREN).

Hexnode MDM

Hexnode MDM

Hexnode MDM is an award winning Enterprise Mobility Management vendor which helps businesses to secure and manage BYOD, COPE, apps and content.

Cycode

Cycode

Cycode is the industry’s first source code control, detection, and response platform.

BitNinja

BitNinja

BitNinja provides full-stack server security in one easy-to-use protection suite. Enjoy real-time protection, automatic false positive handling and threat analysis for more in-depth insights.

Bloc Ventures

Bloc Ventures

Bloc Ventures is an investment company providing long-term, ‘patient’ equity capital to early stage unquoted deep technology companies.

Packetlabs

Packetlabs

Packetlabs specializes in penetration testing services and application security.

Datrix

Datrix

Datrix is a leading Smart Infrastructure and Cyber Security solutions provider. We deliver critical networking, communications and cyber security solutions to public and private sector organisations.

Redbot Security

Redbot Security

Redbot Security provides industry leading manual penetration testing. Protecting critical systems and data - red team attack and breach simulations, (OT) critical infrastructure testing.

Guidepost Solutions

Guidepost Solutions

Guidepost Solutions are a diverse, global team of investigators, experienced security and technology consultants, and compliance and monitoring experts.

Secora Consulting

Secora Consulting

Secora Consulting is a professional services company specialising in tailored cybersecurity assessments and cyber advisory services.

Circle Security

Circle Security

Circle’s breakthrough security API unifies solutions for identity and data security into one architecture and empowers organizations to secure their identity, data and privacy in their applications.

FastPassCorp

FastPassCorp

In the world of IT, identity theft is a growing concern. FastPass offers an innovative solution as a cloud or on-premises offering.

Saidot

Saidot

Saidot is a Finnish AI governance and alignment company committed to helping businesses safely and transparently integrate AI into their operations.

Stern Cybersecurity

Stern Cybersecurity

Stern Cybersecurity offers a robust defense against the ever-evolving landscape of digital threats.