News

2017-03-10

How To Eliminate Insider Threats

Insider cyber threats are a major security problem and the highest level of risk to data security is not external but lies within an organisation.

2017-02-22

Only 20% Of UK Banks Can Properly Detect Breaches

Half of British financial institutions have no adequate data security frameworks or privacy policies. Few of them can confidently detect breaches.

2017-03-10

The 4th Industrial Revolution:Can Democracy Survive ?

The general reshaping of industrial and social life might be making traditional mass participatory institutions & political organisations unviable.

2017-03-09

Security Directly Impacts The Bottom Line At Banks

Banks now recognise that security has a valuable untapped role to play that can deliver immediate tangible results across the entire organisation.

2017-03-09

Healthcare Staff Trigger Google Cyber Defense

So many of the UK’s National Health Service (NHS) staff are using Google's search engine they have triggered its cybersecurity defences.

2017-03-07

Behavior Analytics Will Leapfrog Security

“Credentials-based attacks” using stolen passwords or other authentication mechanisms, cannot be detected by conventional security systems

2017-03-07

Twitter Gains 2m Users But Loses $457m

Although Twittter's current significance in electoral politics is unquestioned, the social media platform's business model is under scrutiny.

2017-03-06

Banks Around The World Hit With Fileless Malware

Kaspersky Lab researchers have brought to light a new series of attacks against 140 plus banks and other businesses around the world.

2017-03-06

Facebook Wants To Eliminate Racially Targeted Advertising

Facebook has updated its advertising policies to ban discrimination based on personal characteristics - race, ethnicity, sexuality or age.

2017-03-03

‘Cyber War’ Is Fast Becoming Just ‘War’

The next great conflict will play out not just on physical terrain but also in the electrical pulses of cyberspace and the electronic spectrum.

2017-03-01

Fake Microsoft Phishing Scam

Access to your Microsoft Email Account Disabled? A campaign of fraudulent messages designed to capture your online identity via a fake website.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IP Performance

IP Performance

IP Performance Limited is a leading supplier of customised network infrastructure and security solutions.

Aptive Consulting

Aptive Consulting

Aptive is a cyber security consultancy providing Penetration Testing and Vulnerability Assessment services.

CybelAngel

CybelAngel

CybelAngel is a leading digital risk protection platform that detects and resolves external threats before these wreak havoc.

Security Onion Solutions

Security Onion Solutions

Security Onion Solutions is the creator and maintainer of Security Onion, a free and open platform for threat hunting, network security monitoring, and log management.

Silensec

Silensec

Silensec is a management consulting, technology services and training company specialized in information security.

Veracity Industrial Networks

Veracity Industrial Networks

Veracity provides an innovative industrial network platform that improves the reliability, efficiency, and security of industrial networks and devices.

Radically Open Security

Radically Open Security

Radically Open Security is the world's first not-for-profit computer security consultancy company.

SYSGO

SYSGO

SYSGO is the leading European provider of real-time operating systems for critical embedded applications in the Internet of Things (IoT).

Cyan Securiy Group

Cyan Securiy Group

Cyan provide best-in-class cyber security solutions for mobile Internet and mobile devices that are extremely effective and highly intuitive in their use.

Cord3

Cord3

Cord3 delivers data protection, even from trusted administrators – or hackers posing as administrators – with high privilege.

Soliton

Soliton

Soliton is a leading Japanese technology company and a pioneer in IT security solutions for protecting company resources and data from external IT security threats.

SessionGuardian

SessionGuardian

SessionGuardian (formerly SecureReview) is the world's first and only technology which ensures second-by-second biometric identity verification of your remote user, from log on to log off.

iSTORM

iSTORM

iStorm specialise in supporting organisations who require a range of Privacy, Security and Penetration testing related services.

Ever Nimble

Ever Nimble

Ever Nimble are award-winning experts in IT support, cybersecurity, and cloud technology. Our proactive approach will enhance your security and protect you from cyber security threats.

BBS Technology

BBS Technology

BBS Technology is a company that develops and delivers next-generation cyber security technologies worldwide.

Idenhaus Consulting

Idenhaus Consulting

Idenhaus specializes in Cybersecurity and Identity Management (IAM) Consulting.