News

2016-07-12

Four Threats To Aviation Security – and Four Responses

From terrorist attacks to geopolitical posturing, aviation is reaching the frontline of global security & cyber risks. Opinion by Anja Kaspersen.

2016-07-11

NATO & Pentagon Want Bitcoin Technology

Blockchain technology has many applications. Finance firms want it to cut admin costs & trade faster. Now it’s the military’s turn.

2016-07-11

Did N. Korea Hack S. Korea’s Key Defense Contractor?

Naval shipbuilder Hanjin Heavy Industries & Construction has suffered a serious hack and North Korea is the top suspect,

2016-07-11

Hillary Clinton’s Email Problems Just Get Worse

The FBI has recommended that no charges be brought following its investigation of the former secretary of state's private email server. What next?

2016-07-11

China’s South Sea Cyber War

Beijing's cyber war capabilities could change the strategic balance in Asia, eclipsing the potential danger of rising tensions in the South China Sea.

2016-07-08

Brexit Fallout Continues – ePrivacy

UK losing influence over the EU review of online privacy laws just as the long-running dispute over transatlantic data transfers appears to be settled.

2016-07-08

Cybersecurity Insurance – What Is It? How Does It Work?

Cyber insurance has been around for almost a decade, but is only now becoming a popular safeguard against hackers.

2016-07-07

Chilcot: False Intelligence Led To Iraq Invasion Which Spawned IS

MI6 was misled to believe Saddam Hussein was producing WMD by a false agent who based his reports on a Hollywood action movie.

2016-07-08

Tesla Test Driver Dies On Autopilot

A Tesla test driver was killed in the first known fatal crash involving a self-driving car. He was watching a film at the time of collision.

2016-07-06

Is Edward Snowden Really A Russian Agent?

To anybody acquainted with how Russia’s powerful intelligence services operate, the idea that Snowden is their collaborator is hardly controversial

2016-07-06

Is The Boom In Ransomware Stabilizing?

The criminal world appears to be fully incorporating ransomware into its business model.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

F5 Networks

F5 Networks

F5 products ensure that network applications are always secure and perform the way they should—anywhere, any time, and on any device.

Patchstack

Patchstack

Patchstack (formerly WebARX) is a web application security platform, which allows digital agencies and developers to monitor, protect and maintain their websites.

ARC Advisory Group

ARC Advisory Group

ARC is a leading technology research and advisory firm with expertise in both information technologies (IT) and operational technologies (OT)

Hornetsecurity

Hornetsecurity

Meet Hornetsecurity – Leading Cloud Email Security Provider. We protect global organizations so you can focus on what you do best.

CTM360

CTM360

CTM360 is a unified external security platform offering 24x7x365 Cyber Threat Management for detecting and responding to cyber threats.

DigiSec360

DigiSec360

DigiSec360 is a technology firm focused on the human element of cybersecurity.

Fudo Security

Fudo Security

Fudo Security is a leading provider of privileged access management and privileged session monitoring solutions.

ECHO Project

ECHO Project

The main objective of ECHO is to strengthen the cyber defence of the European Union, enhancing Europe’s technological sovereignty through effective and efficient multi-sector collaboration.

Conquest Cyber

Conquest Cyber

Conquest Cyber builds adaptive risk management programs where innovation is most needed – within defense, intelligence, federal civilian agencies and the industrial base that supports them.

Prelude

Prelude

Prelude offer the first autonomous platform built to attack, defend and train critical assets through continuous red-teaming.

Aite-Novarica Group

Aite-Novarica Group

Aite-Novarica's Cybersecurity practice provides ongoing research and advisory services to chief information security officers focused on protecting their companies’ assets.

BlueSteel Cybersecurity

BlueSteel Cybersecurity

BlueSteel is a compliance consulting firm that leverages deep system, data and application expertise to build sustainable cybersecurity solutions.

National Cyber Security Agency (NCSA) - Thailand

National Cyber Security Agency (NCSA) - Thailand

National Cyber Security Agency of Thailand is responsible for coordinating and implementing national cybersecurity policies, strategies, and initiatives.

MARS Suite

MARS Suite

MARS Suite is your all-in-one solution for cyber protection & compliance. Cybersecurity and risk management is what we do best. And we’re making it simple and easy.

Jersey Cyber Security Centre (JCSC)

Jersey Cyber Security Centre (JCSC)

Jersey Cyber Security Centre is the jurisdiction's Cyber Emergency Response Team (CERT) and national technical authority for cyber security.

Synersoft BLACKbox

Synersoft BLACKbox

Synersoft, the maker of path-breaking and disruptive technology for SMEs, now branded as BLACKbox, is an incubated and invested portfolio company of CIIE - IIM-Ahmedabad.