News

2017-08-18

Online Credit Card Fraud In Australia Surges

Last year criminals stole A$534 million as fraudsters keep pace with Australian consumers moving online.

2017-08-17

Cloud Portability Is Still Science Fiction

Enterprises want cloud portability, but the amount of work and money needed effectively prohibit them from moving in that direction.

2017-08-16

Nazi Website Taken Over By Anonymous

Hacker collective Anonymous have taken over a notorious Nazi website, following clashes in the US between protesters and white nationalists.

2017-08-16

Can US Cyber Weapons Stop N. Korea’s Nuclear Missiles?

Is it possible for the US to simply flick a switch and shut down the North Korean nuclear programme from 11,000km away?

2017-08-16

Learning About ISIS Intentions Using Open Source Intelligence

In Plain Sight: ISIS is encouraging its operatives & supporters around the globe to carry out attacks in their own countries. By Vasco Da Cruz Amador

2017-08-16

Interpol/Group-IB Unmasking Pro-ISIS Hackers

Interpol has teamed up with Russian security firm Group-IB in an effort to identify the members of a pro-ISIS hacker group.

2017-08-17

Using AI In Business Intelligence

Enterprise is entering a new era ruled by data. AI in business intelligence is evolving into many aspects of everyday business.

2017-08-16

German Police To Hack Suspect Devices

Forget About Backdoors: Police forces in Germany will be allowed to hack any suspected mobile device using interception software.

2017-08-14

Who Are The Shadow Brokers?

The indications point to intelligence insiders who are either current or former US intelligence community contractors.

2017-08-14

The US Power Generation System Is Under Siege

A remote substation working through a control system not connected via the Internet has less security than a power plant & is often an entry point.

2017-08-15

Singapore’s Mounting Cyber Threats

With mounting regional tensions the Singpore government is stepping up meaures to protect itself from cyber attacks.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ARC Advisory Group

ARC Advisory Group

ARC is a leading technology research and advisory firm with expertise in both information technologies (IT) and operational technologies (OT)

VerifyMe

VerifyMe

VerifyMe is a global technology solutions company delivering brand protection offerings to mitigate counterfeiting, product diversion, and illicit trade.

SentryBay

SentryBay

SentryBay is the global leader in preventative endpoint isolation protection. We protect remote, BYOD and corporate endpoints so they can safely and securely connect with your corporate network.

Information Systems Security Partners (ISSP)

Information Systems Security Partners (ISSP)

ISSP is a specialized system integrator focused on the information security needs of its corporate clients and providing best in class products and services for securing organizational information.

Vdoo

Vdoo

Vdoo provides an end-to-end product security platform for automating all software security tasks throughout the entire product lifecycle.

The Legal 500

The Legal 500

The Legal 500 Hall of Fame highlights, to clients, the law firm partners who are at the pinnacle of the profession. Practice areas covered include Data Protection, Privacy and Cybersecurity.

Gytpol

Gytpol

Gytpol is a leader in Endpoint Configuration Security (ECS) solutions, providing validation, remediation & securing of IT Policies and IT Infrastructure on-premise and in the cloud.

Netgo

Netgo

Netgo group meet the requirements of a complex, digitized world with IT consulting, IT solutions & services, managed & cloud services and software products & development.

Commvault

Commvault

Commvault's data protection and information management solutions help companies protect, access and use all of their data, anywhere and anytime.

Appknox

Appknox

Appknox is the world’s most powerful plug-and-play security platform that helps developers, security researchers, and enterprises to build a safe and secure mobile ecosystem.

ZoobeTek

ZoobeTek

ZoobeTek are a company focused on preventing leaks related to the security of business information3.

Ultima

Ultima

Ultima are on a mission to help businesses unlock their true potential by using the right IT to protect your company’s revenue and reputation – 24/7.

Precision Cybertechnologies & Digital Solutions (Precision-Cyber)

Precision Cybertechnologies & Digital Solutions (Precision-Cyber)

Precision-Cyber was founded on the philosophy of state-of-the-art cybersecurity and digital solutions. Our guiding principle is simply that we will provide and secure all your digital needs.

ViCyber

ViCyber

ViCyber is an Australian based company whose mission is to simplify and strengthen cybersecurity for all businesses, irrespective of size.

WIIT Group

WIIT Group

WIIT Group are focused on a single goal: securing our clients’ critical processes and enabling them for digital transformation.

Kali Linux

Kali Linux

Kali Linux is an open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing.