News

2017-07-20

Russia Suspected As Hackers Breach Power Plant Systems

Hackers working for a foreign government have breached at least a dozen US power plants, searching for vulnerabilities in the electrical grid.

2017-07-21

Cyber Attacks Demonstrate Why The Cloud Is Safer

Both WannaCry and Petya ransomware attacks are a reminder of why the cloud is a safer place to store critical data.

2017-07-21

Ukraine Accuses Russia Of Ransomware Attack

Ukraine has formally accuses Russia of launching cyber attacks, disrupting the work of public &private institutions by locking down their databases.

2017-07-19

British Businesses Are Unaware Of Data Protection Laws

Almost two-thirds of British businesses are unaware they could face fines of up to €20million with the introduction of GPPR.

2017-07-19

Find Your Digital Risk

A comprehensive assessment of your digital risk starts with knowing where to find it; the Dark Web is a good place to start looking.

2017-07-19

Half Of US Firms Do Not Buy Cyber Insurance

A full 50% of US firms do not have cyber risk insurance and 27% of US executives say their firms have no plans to take out a cyber policy.

2017-07-18

Reinventing Cold War Spy Craft

State-sponsored hackers are adopting classic espionage techniques which are being reinvented for the modern era of spying.

2017-07-18

Do British Police Take Cyber Crime Seriously?

The UK National Audit Office reports that regional police forces are overlooking the growth in cybercrime. Police chiefs are trying to respond.

2017-07-18

AI And Robotics Can Fight Cyber Crime

New techniques in AI, Machine Learning and Quantum Computing can massively improve the speed of cyber crime detection & prevention.

2017-07-18

Cybersecurity: The Cold War Online

The Internet is under attack, and not just by hackers, thieves and spies. Cyber-space is becoming a war zone in a new era of ideological combat.

2017-07-17

Terrorist Activities On Social Media

The financial services sector is required to report suspicious transactions. Should the same apply to suspicious communications on social media?

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Puppet

Puppet

Puppet is a leader in IT automation. Our software helps DevOps securely automate configuration and management of machines and the software running on them.

Copper Horse Solutions

Copper Horse Solutions

Copper Horse specialises in mobile and IoT security, engineering solutions throughout the product lifecycle from requirements to product security investigations.

LRQA

LRQA

LRQA is an award-winning global provider of cybersecurity services, bringing innovative thought leadership to the ever-evolving cybersecurity marketplace.

Recorded Future

Recorded Future

Recorded Future arms security teams with threat intelligence powered by patented machine learning to lower risk.

ThreatBook

ThreatBook

ThreatBook is dedicated to providing real-time, accurate and actionable threat intelligence to block, detect and prevent attacks.

Proteus

Proteus

Proteus is an Information Security consulting firm specialized in Risk Analysis and Executive Control.

Mitre

Mitre

At Mitre we work across government to tackle challenges to the safety, stability, and well-being of our nation. Areas of expertise include Cybersecurity.

ETSI

ETSI

ETSI is a European Standards Organization dealing with telecommunications, broadcasting and other electronic communications networks and services including cybersecurity.

PeckShield

PeckShield

PeckShield is a blockchain security company which aims to elevate the security, privacy, and usability of entire blockchain ecosystem by offering top-notch, industry-leading services and products.

Swisscom Blockchain

Swisscom Blockchain

Swisscom Blockchain is focused on supporting the implementation and adaption of Blockchain-based platforms in enterprises across diverse industries.

North American International Cyber Summit

North American International Cyber Summit

The North American International Cyber Summit brings together experts from around the globe to provide timely content and address a variety of cybersecurity issues impacting the world.

Deft

Deft

Deft (formerly ServerCentral Turing Group) is a trusted provider of colocation, cloud, and disaster recovery services.

Valency Networks

Valency Networks

Valency Networks provide cutting edge results in the areas of Vulnerability Assessment and Penetration Testing services for webapps, cloud apps, mobile apps and IT networks.

Spinnaker Support

Spinnaker Support

Spinnaker Support is a premier global provider of on-premise and cloud-based enterprise software support services.

Singtel Innov8

Singtel Innov8

Singtel Innov8, the venture capital arm of the Singtel Group, invests in and partners with innovative technology start-ups globally.

Strategic Technology Solutions (STS)

Strategic Technology Solutions (STS)

Strategic Technology Solutions specialize in providing Cybersecurity and Managed IT Services to the legal industry.