News

2016-06-29

Hackers Target Vulnerabilities Across US Politics

Russian hackers have burrowed deep into the US political system, sweeping in law firms, lobbyists, consultants, foundations and think tanks.

2016-06-27

Snowden Calls For Special Protection For Whistleblowers

Should there be special protection for government employees who break secrecy laws? Safe in Moscow, Edward Snowden thinks so.

2016-06-27

NATO Tools Up For Cybewar

Just like air, sea, land and space, now cyberspace is officially considered a likely battlefield by the world's biggest military alliance.

2016-06-25

The Secret History of Cyber War

Whilst it complains of the level and persistence of foreign cyber attacks against business and government agencies, the fact is, the US started it.

2016-06-27

US National Cybersecurity Plan Costs $19b

The US Government is contemplating a one-stop shop for agencies to buy cyber-incident response services as part of an expensive cybersecurity plan.

2016-06-27

British Companies Buy Bitcoins As Ransom Money

A cyber-security survey finds that one third of UK companies are buying Bitcoin in anticipation of ransomware attacks.

2016-06-27

Beware: Top Cyber Scams To Avoid This Summer

The summer months hold a treasure trove for cybercriminals wanting to take advantage of unsuspecting victims.

2016-06-24

Insurers Want A Comprehensive Cyber Attack Database

The head of the Association of British Insurers wants to create a database where companies would have to record details of cyber attacks.

2016-06-25

Protecting the Next Generation: Make It Personal

We need to recognise the issues that are fundamental to protecting future generations and take advantage of all that the digital age provides.

2016-06-24

Video-Gaming Is The Next Cybercrime Target

Any endeavor that makes money quickly draws the attention of fraudsters and thieves, and videogames are no exception.

2016-06-24

UK’s Cybersecurity Policy For Business

Despite some policy confusion, the British government has decided to embrace cloud computing as a way of combating cyber-attacks.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Akin Gump Strauss Hauer & Feld

Akin Gump Strauss Hauer & Feld

Akin is a leading global law firm providing innovative legal services and business solutions to individuals and institutions. Practice areas include Cybersecurity, Privacy and Data Protection.

Illumio

Illumio

Illumio delivers adaptive security for every computing environment, protecting the 80% of data center and cloud traffic missed by the perimeter.

AMETIC

AMETIC

AMETIC, is the Association of Electronics, Information and Communications Technologies, Telecommunications and Digital Content Companies in Spain.

StrongKey

StrongKey

StrongKey (formerly StrongAuth) is a leader in Enterprise Key Management Infrastructure, bringing new levels of capability and data security at a price point significantly lower than other solutions.

CyberGuarded

CyberGuarded

CyberGuarded are an accredited vendor independent information security testing and auditing company.

Buglab

Buglab

The Buglab contest and Vigilante Protocol help companies all over the world to discover and fix vulnerabilities on their digital solutions or assets.

Tenzir

Tenzir

Tenzir's primary focus lies on network forensics: the systematic investigation of cyber attacks with big data analytics.

NinjaJobs

NinjaJobs

NinjaJobs is a community-run job platform developed by information security professionals. We focusing strictly on cybersecurity positions.

CyberUK

CyberUK

CYBERUK is the UK government’s flagship cyber security event and the authoritative event for the UK’s cyber security community.

Arcturus Security

Arcturus Security

Arcturus is a CREST-approved cyber security consultancy created by experts in the field.

Com Olho

Com Olho

Com Olho provides the measurement, analytics, quality assurance, and fraud protection technologies brands need for their business and customers.

Primus Institute of Technology

Primus Institute of Technology

At Primus Institute of Technology our mission is to inspire, support, and empower current and aspiring IT professionals through training and career development workshops.

Pillr

Pillr

Pillr is a cybersecurity operations platform capable of adapting to the demands of your business and team — and the global threat landscape.

Pixee

Pixee

Pixee fixes vulnerabilities, hardens code, squashes bugs, and gives engineers more time to focus on the work that counts.

Soteria Cybersecurity

Soteria Cybersecurity

Soteria is your trusted Cybersecurity Partner in IT and OT.

Lattica

Lattica

Lattica provides a cryptography solution for privacy-preserving interaction with AI services.