News

2018-06-14

Chinese Hackers Steal Naval Warfare Secrets

A contractor using an unsecured network was the entry point for Chinese hackers to steal top secret data about the US Navy's submarine missiles.

2018-06-13

America Can Learn About Russian Disinformation From Europe

The information warfare tactics used in Ukraine, Estonia and elsewhere in Europe are easily replicable in the next US midterm elections.

2018-06-13

Cybercrime: Under-Reporting Gives Hackers A Green Light

The lack of successful cybercrime reporting in the UK means that cyber attackers believe there are no consequences of their actions.

2018-06-13

Google Workers Are Revolting

Thousands of Google employees have signed an open letter asking the Internet giant to stop working on a project for the US military.

2018-06-13

F-35 Is The Most Thoroughly Tested Cyber Weapon

Debugging: With almost 9m lines of software code the new warplane has been described as essentially a flying computer.

2018-06-12

Facebook Admits Privacy Settings 'Bug' Affects 14 Million Users

Bad To Worse: Forget about giving user data away to dodgy business partners, it looks like Facebook can't protect your privacy even when it wants to.

2018-06-12

Cyber Thesaurus - Vocabulary Pt.1

Cyber-security has its own intimidating jargon. You’ll be better equipped to address your cyber risks when you know the terminology.

2018-06-12

Russia Is Building A Separate Military Cloud

Russia is building a giant military cloud, to improve its ability to keep operating if its connection to the global Internet is hacked or severed.

2018-06-12

Banking Botnet Profit Share

The experts at Flashpoint say two separate banking botnets appear to have started a collaboration targeting systems to steal money.

2018-06-12

Ukraine Detects A Cyber Attack On A NATO Member

The Ukraine Security Service claims to have frustrated an attempted attack on a NATO member state, but remains oddly silent about which one.

2018-06-11

Digital Shock: Special Report (£)

The 4th Industrial Revolution will create an integration of digital, physical and biological systems that will significantly change our world.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Zerto

Zerto

Zerto provides enterprise-class disaster recovery and business continuity software specifically for virtualized data centers and cloud environments.

Cyber Together

Cyber Together

Cyber Together is dedicated to advancing the cyber security industry by giving businesses access to Israel’s leaders, innovators and great minds in the field of cyber security.

ZM CIRT

ZM CIRT

ZM CIRT is the national Computer Incident Response Team for Zambia.

SIGA

SIGA

SIGA provides cyber security solutions for Industrial Control Systems SCADA systems used in critical infrastructures and industrial processes.

Cyber Defense Agency (CDA)

Cyber Defense Agency (CDA)

Cyber Defense Agency is a premier professional services firm specializing in cyber security, computer network defense, and information security.

Secure Soft

Secure Soft

Secure Soft are experts in Computer and Information Security with a presence in Peru, Colombia and Ecuador.

SevenShift

SevenShift

SevenShift is a security consulting firm with a wealth of experience in the worlds of Cybersecurity and Internet of Things (IoT).

Pentera Security

Pentera Security

Pentera (formerly Pcysys) is focused on the inside threat. Our automated penetration-testing platform mimics the hacker's attack - automating the discovery of vulnerabilities.

African Cyber Security

African Cyber Security

African Cyber Security and it's partners, have the expertise and skills to provide holistic solutions for companies, institutions and government.

iHLS Startups Accelerator

iHLS Startups Accelerator

iHLS Accelerator is the first startup accelerator in the world in the security and homeland security field.

Tier One Technology Partners

Tier One Technology Partners

Tier One Technology Partners is an IT managed services provider that focuses on cybersecurity, cloud services, IT consulting, and infrastructure.

CyberGuard Technologies

CyberGuard Technologies

CyberGuard Technologies provides a suite of fully managed end-to-end security services from its 24/7 UK security operations centre.

Comcast Business

Comcast Business

Comcast Business keeps businesses ready for what’s next with powerful connectivity, advanced cybersecurity solutions, and the right people at your side.

Nitrokey

Nitrokey

Nitrokey is the world-leading company in open source security hardware. Nitrokey develops IT security hardware for data encryption, key management and user authentication.

RankedRight

RankedRight

RankedRight empowers security teams to take immediate action on their most critical risks.

Nuts Technologies

Nuts Technologies

Nuts Technologies are simplifying data privacy and encryption with our innovative and novel data containers we call nuts based on our Zero Trust Data framework.