News

2016-05-18

Hacking Team Postmortem

Hacking Team sells intrusion and surveillance tools to governments and law enforcement agencies. Nine months ago they were hacked.

2016-05-24

As Pentagon Dawdles, Silicon Valley Sells It’s Hottest Technology Abroad

Technolgy CEOs say red tape and onerous requirements are undermining just the sorts of products that the Pentagon says it wants.

2016-05-23

Could Bitcoin’s Blockchain Run An Entire City?

The smart city is not a pipe dream, but it is a big, intimidating problem. Blockchain technology could solve that.

2016-05-25

Cyber Insurance: Security Tool or Hype?

Cyber insurance fits into the broader context of a security strategy focused on risk mitigation

2016-05-25

Mobile Spying – What’s Possible, Ethical Or Useful?

Many widely used mobile apps have a legitimate feature - remote mobile monitoring. Is this any different from illegitimate spyware?

2016-05-20

Related Aspects Of A Breach: Impact Of Partners & Suppliers

Analysis of the giant breach at retailer Target shows that business partners and suppliers can spell big trouble for an organization’s security.

2016-05-20

Vulnerable Australia Boosts National Cyber Security

Australia introduces a multi-million-dollar national cybersecurity policy to combat hacking but stops short of blaming recent attacks on China.

2016-05-23

Healthcare Execs Credit IT With Improving Care

Healthcare managers say the cost savings and interoprability benefits of improved IT systems outweigh the security concerns.

2016-05-23

Unified Cyber Command To Help US React Faster

Defense leaders are contemplating elevating US CyberCom to a full-fledged unified command.

2016-05-20

Enhanced Attribution Program To Identify & Track Hackers Worldwide

Pentagon researchers want to consistently identify virtual personas and individual malicious cyber operators across different endpoint devices.

2016-05-18

'Guccifer' Claims He Got Inside Hillary Clinton's Server

Romanian hacker claims to have gained access to the former US Secretary of State's Clinton's "completely unsecured" server.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Axiomatics

Axiomatics

Axiomatics provides dynamic authorization and access control solutions to protect critical data assets.

Odix

Odix

Odix security software neutralizes file embedded targeted cyber attacks before they enter your organization’s network.

Early Warning Services

Early Warning Services

Early Warning is committed to providing awareness, education, and enablement around fraud prevention.

ES2

ES2

ES2 is a consulting organisation specialising in Enterprise Security and Solutions Services.

DarkLight

DarkLight

DarkLight is a cybersecurity platform that mimics human thinking at scale to build resiliency to Advanced Persistent Threats.

CyberSecurity Non-Profit (CSNP)

CyberSecurity Non-Profit (CSNP)

CyberSecurity Non-Profit (CSNP) is a 501(c)(3) non-profit organization dedicated to promoting cybersecurity awareness and education.

Critical Start

Critical Start

Critical Start provides Managed Detection and Response services, endpoint security, threat intelligence, penetration testing, risk assessments, and incident response.

Duality Technologies

Duality Technologies

Duality Technologies combine Advanced Cryptography with Data Science to deliver High-Performance Privacy-Protecting Computing to Regulated Industries.

Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

ICS-ISAC is a non-profit, public/private Knowledge Sharing Center established to help facilities develop situational awareness in support of local, national and international security.

Netenrich

Netenrich

The Netenrich operations intelligence platform is built from the ground up to help enterprises resolve everyday and futuristic problems for stable, secure environments and infrastructures.

Contechnet Deutschland

Contechnet Deutschland

Contechnet Deutschland started as a specialist in the area of IT disaster recovery and has since broadened its portfolio into information security and data protection.

McDonald Hopkins

McDonald Hopkins

McDonald Hopkins is a business advisory and advocacy law firm. We focus on insightful legal solutions that help our clients strategically plan for an increasingly competitive future.

Primary Guard

Primary Guard

Primary Guard provides IT solutions and computing technologies that help minimize impact from cyber threats, improve business efficiency and maintain essential functions during or after a disaster.

Entro Security

Entro Security

Entro is the first holistic secrets security platform that detects, safeguards, and enriches with context your secrets across code, vaults, chats, and platforms.

Chorus Cyber

Chorus Cyber

Chorus are a leading Managed Security Service Provider (MSSP), and member of the Microsoft Intelligent Security Association (MISA), with three Microsoft Advanced Specialisations in security.

BlackSignal Technologies

BlackSignal Technologies

BlackSignal Technologies provides cybersecurity, digital signal processing and electronic warfare products to help DOD and IC agency customers counter near-peer threats and security challenges.