News

2016-01-26

Bitcoin Developer Says Cryptocurrency Has Failed

A senior bitcoin developer has declared the cryptocurrency a failed experiment, blaming the refusal to adopt new standards.

2016-01-26

Is the US Ready For Cyberwar?

Not only is cyberwar between major world powers inevitable, but the US has allowed itself to fall dangerously behind in preparing for it.

2016-02-01

Islamic State Is An Existential Threat

Put together money, expertise & Islamist-nihilist philosophy and you have a weapon of huge destructive power. Opinion by John Lloyd

2016-01-28

How Much Are You Worth?

This new online tool can tell you what you should be earning from automated analysis of your CV.

2016-01-27

The New Art of War – Cyber Conflict

Cyberwar isn't going to be about hacking power stations. It's going to be far more subtle and much more dangerous.

2016-01-27

Safety Agreement On Cyber and Wired Vehicles

The US Govt. and 17 car makers have reached agreement to enhance vehicle safety to thwart cyber-attacks on their increasingly wired vehicles.

2016-01-27

Organisations Have A False Sense of Data Security (£)

Most organisations equate IT security compliance with actual strong defense, leaving their data at risk through a false sense of security.

2016-01-31

ISIS Hackers Join Forces with AnonGhost

Hackers supportive of the Islamic State militant group (ISIS) have teamed up with the Pro-Palestinian hacking group AnonGhost.

2016-01-27

When ISIS Turns to Cyber Warfare

A US cybersecurity software firm PKWare has made predictions for potential computer attacks in the US and the forecast is scary.

2016-01-25

US Says China Stole Military Robot Designs

Chinese army allegedly hacked a QinetiQ specialist who worked on embedded software in microchips that control military robots.

2016-01-25

World Economic Forum Says Cyber-attack Is A Top Risk To Business.

In 140 economies cyber-attacks rank in the top ten threats in 2016.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ShmooCon

ShmooCon

ShmooCon is an annual east coast hacker convention offering three days of demonstrations and discussions of critical infosec issues.

SecWest

SecWest

SecWest is the organizer of CanSecWest, PACSEC, originator of PWN2OWN, security auditing, and virtual engagement/training.

Agari

Agari

Agari is the Trusted Email Identity Company™, protecting brands and people from devastating phishing and socially-engineered attacks.

Lacework

Lacework

Lacework brings speed, scale, and automation to cloud security and allows security and DevOps teams to collaborate on keeping data and applications safe.

National Security Authority (NBU) - Slovakia

National Security Authority (NBU) - Slovakia

The National Security Authority (NBU) is the central government body in Slovakia for the Protection of Classified Information, Cryptographic Services, Trust Services and Cyber Security.

AKS IT Services

AKS IT Services

AKS IT Services (an ISO 9001:2015 and ISO 27001:2013 certified company) is a leading IT Security Services and Solutions provider.

Andreessen Horowitz (a16z)

Andreessen Horowitz (a16z)

Andreessen Horowitz (known as "a16z") is a venture capital firm in Silicon Valley, California that backs bold entrepreneurs building the future through technology.

Crypsis

Crypsis

Crypsis was built based on a shared vision of creating a more secure digital world by providing the highest quality incident response, risk management, and digital forensic services.

Qasky

Qasky

Anhui Qasky Quantum Technology Co. Ltd. (Qasky) is a new high-tech enterprise engaged in quantum information technology industrialization in China.

Gigit

Gigit

Gigit’s Service portfolio focuses on your business’ needs and the integration of comprehensive cybersecurity policies, plans, procedures, and practices into your business culture and operations.

Future Planet Capital

Future Planet Capital

Future Planet is the impact-led, global venture capital firm built to invest in high growth potential companies from the world's top research centres.

Alias

Alias

Alias (formerly Alias Forensics) provide penetration testing, vulnerability assessments, incident response and security consulting services.

Womble Bond Dickinson

Womble Bond Dickinson

Womble Bond Dickinson is a transatlantic law firm, providing high-quality legal experience and outstanding personal service from key locations across the United Kingdom and United States.

Resourcive

Resourcive

Resourcive is the first Value Added Sourcing “VAS” consultancy. We deliver strategic IT sourcing solutions to mid-market and enterprise clients.

Prembly

Prembly

Prembly are a compliance and security infrastructure company.

CloudBees

CloudBees

CloudBees is building the world’s first end-to-end automated software delivery system, enabling companies to balance governance and developer freedom.