News

2017-03-30

Here Comes China’s Crypto-Currency

Forget about Bitcoin. China is busy converting the Renimbi to digital and this crypto-currency has the backing of an entire nation.

2017-03-30

Hackers Threaten To Attack Israel's Cyber Infrastructure

People associated with the Anonymous hackers' organisation are threatening to attack Israel's cyber infrastructure on April 7th.

2017-03-30

Hong Kong’s 3.7 Million Voters Exposed in Massive Breach

Hong Kong has suffered its biggest ever data breach after the personal details 3.7 million voters were lost on stolen laptops.

2017-03-29

WikiLeaks Dump Shines Light On US Intelligence’s Zero-Day Policy

Zero Days exploits used to create and promulgate a software patch are goldmines for US intelligence agencies.

2017-03-29

Board-level Cyber Literacy Is Low, Discomfort High

Business leaders who continue to view cybersecurity as a matter for the IT department leave their companies exposed to major risks.

2017-03-29

Drones For Rail & Road Tunnel Inspections

Road & rail tunnels must be inspected regularly to detect anomalies. Singapore thinks drones can replace manned inspection teams for this task.

2017-03-29

Google Search For A Fraud Victim

US judge orders Google to provide information on any internet user found to have searched for one of four variations of a fraud victim’s name.

2017-03-28

Cybersecurity’s Human Side Is A Problem

The challenge in building cybersecurity resilience is that it is not only about software, code and laws but especially about people.

2017-03-28

Security & Encryption After Edward Snowden

Four years after the renegade NSA employee first leaked details of its secret international surveillance activities, Snowden still makes news.

2017-03-27

A Quick Tour Of Cybercrime’s Underground

The evolution of cybercrime has hit a peak with ransomware and Bitcoin. One of the strange features of this is how much of it is in public.

2017-03-24

Flight Ban On Laptops 'sparked by IS threat'

Airplane Mode: Advances in electronics now mean that just about anything with a power source can be turned into an explosive.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Montash

Montash

Montash is an award winning, global technology recruitment business, specialising in the acquisitions of high-performing talent across a number of core disciplines including Information Security.

Brookings Institution

Brookings Institution

The Brookings Institution is a nonprofit public policy organization. Cyber security is covered within the various study areas.

ManagedMethods

ManagedMethods

ManageMethods Cloud Access Monitor is the only Cloud Access Security Broker (CASB) that can be deployed in minutes, with no special training, and with no impact on users or networks.

Security Network Munich

Security Network Munich

Security Network Munich brings together leading players in the field of information and cyber security through joint research and innovation projects.

Athena Dynamics

Athena Dynamics

Athena Dynamics focuses on Cyber Security, especially in Critical Information Infra-structure Protection and Enterprise IT Operation Management products and Services.

Physec

Physec

Physec offers innovative security products and solutions for the Internet of Things ecosystem.

NetSecurity

NetSecurity

NetSecurity is a Brazilian company specializing in Information Security. We provide Managed Security Services (MSS), network security solutions and other specialist services.

Jamf

Jamf

Jamf is the only Apple Enterprise Management solution of scale that remotely connects, manages and protects Apple users, devices and services.

Soteria

Soteria

Soteria is a global leader in the development, integration and implementation of advanced cyber security, intelligence and IT solutions, delivering complete end-to-end solutions.

Centroid

Centroid

Centroid is a cloud services and technology company that provides Oracle enterprise workload consulting and managed services across Oracle, Azure, Amazon, Google, and private cloud.

Centre for Cyber Security Research & Innovation

Centre for Cyber Security Research & Innovation

The Centre for Cyber Security Research & Innovation is Nepal's First Academic Research Institute to focus on understanding the overall Information Security of Nepalese Organizations.

DIGISOC

DIGISOC

DIGISOC, a leader in Latin America in Cybersecurity solutions, combines machine learning with human intelligence to be effective in detecting cyber threats.

Security Compliance Associates (SCA)

Security Compliance Associates (SCA)

The sole focus of SCA is safeguarding critical information and complying with information security regulations.

AddSecure

AddSecure

AddSecure is a leading European provider of secure IoT connectivity and end-to-end solutions.

Fraud.net

Fraud.net

Fraud.net operates the first end-to-end fraud management and revenue enhancement ecosystem specifically built for digital enterprises and fintechs globally.

STACK Cybersecurity

STACK Cybersecurity

STACK Cybersecurity serves as a strategic partner, guiding you through the intricate and dynamic cybersecurity landscape.