News

2016-12-29

Decent Broadband 'denied' To Millions

More than 1.4 million homes in the UK cannot get decent broadband, a report from telecoms regulator Ofcom reveals.

2016-12-27

We Are In A New Era Of Espionage

Hackers' interference in the US Presidential Election is one of the greatest examples of a successful espionage operation in history.

2016-12-21

Healthcare Data Breaches In 2017 Will Get Worse

Personal medical data is among the most valuable kinds of information to hackers and healthcare managers pay handsomely to get it back.

2016-12-21

Online Con Tricks Senior Executives Out of Millions

‘Whaling’, a form of spear phishing, sees high-net-worth individuals tricked into authorising online payments to cyber scammers posing as employees.

2016-12-21

No Password Is Too Complex For Hackers

Another huge data breach and another reason that the current password security system for business applications and websites is flawed.

2016-12-21

What Happened To The Blockchain Revolution?

The Financial Services industry is struggling to incorporate Blockchain technology as a standard for post-trade processing.

2016-12-21

NSA Eavesdrops On In-flight Mobile Calls

Thieving Magpie: The NSA and GCHQ have a joint surveillance program dedicated to intercepting targets in-flight by tracking their mobiles.

2016-12-21

Making Sense Of Cyber Insurance

The Dark Web. A sequence of huge Data Breaches. Ransomware. Virtual Currency. How do insurers & their customers make sense of Cybersecurity?

2016-12-20

Tackling Cybercrime: Time For The Regional Gulf Cooperation Council To Join Global Efforts

Gulf countries need to share information, intelligence & lessons learned in order to find the best ways to curb cybercrime. Opinion by Joyce Hakmeh

2016-12-20

Amazon Makes First Successful UK Drone Delivery

Autonomous aerial delivery could be a viable business sooner than thought. For customers with huge gardens, living close to the depot.

2016-12-20

Insurers Are Handling 'hundreds' Of Breach Claims

Business Is Booming: Leading London insurance firm says claims for data breaches are being made at a rate of more than one a day.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Zayo

Zayo

Zayo is a leading global bandwidth infrastructure services provider for high-performance connectivity, secure colocation and flexible cloud services.

ARC Advisory Group

ARC Advisory Group

ARC is a leading technology research and advisory firm with expertise in both information technologies (IT) and operational technologies (OT)

CyberOwl

CyberOwl

CyberOwl builds on cutting-edge research and combines decades of experience in developing, securing and operating large distributed systems.

Wizlynx Group

Wizlynx Group

Wizlynx services cover the entire risk management lifecycle from security assessments and compliance to the implementation of security solutions and provision of Managed Security Services.

Quantum Generation

Quantum Generation

Quantum Cyber Security for a new age of communications. We are developing the largest decentralized orbital, and ground quantum mesh network based on blockchain technology.

SearchInform

SearchInform

SearchInform is a leading risk management product developer, protecting business and government institutions against data theft, harmful human behavior, compliance breaches and incomplete audit.

InfoExpress

InfoExpress

InfoExpress provides network security solutions that enhance productivity and security through better visibility, improved security, and automating device and mobile access to the network.

Kasm Technologies

Kasm Technologies

Kasm Browser Isolation - Protect your organization from malware, ransomware and phishing by using zero-trust containerized browsers.

Synamic Technologies

Synamic Technologies

Synamic Technologies was founded in 2018 as a start-up to automate cyber security processes. Our CISOSCOPE product automates vulnerability management, risk management and compliance.

HiScout

HiScout

HiScout is your integrated management system for IT governance, risk & compliance.

Infostream

Infostream

Infostream is a leading integrator of Digital Transformations Solutions (DTS); Public, Private, and Hybrid Cloud; Cybersecurity; Data Integrity; DevOps, DevSecOps, and Infrastructures.

CryptoDATA

CryptoDATA

CryptoDATA develops products and services based on Blockchain technology, that ensure user security and data encryption, applicable in various fields.

Trackd

Trackd

At trackd, we’re re-imaging vulnerability remediation for the benefit of the entire cyber security community. Automating Vulnerability Remediation without the Fear of Disruption.

PixelQA

PixelQA

Are you looking for a security testing company to cross-check whether your software or mobile app has a possible security threat or not?

WireGuard

WireGuard

WireGuard is a communication protocol and free and open-source software that implements encrypted virtual private networks (VPNs).

TrueBees

TrueBees

TrueBees is the first deepfakes detector able to detect AI-generated portraits shared on social media and to prevent their diffusion across the web.