News

2016-01-22

2016 Is On The Cusp Of A Machine Revolution

The convergence of technologies across sensors, networks, artificial intelligence and robotics is making amazing things possible.

2016-01-20

UK Police Deploy Drone-Jamming Technology at Major Public Events

British police are planning to use sophisticated unmanned aerial vehicle (UAV) detection & jamming technology to detect terrorist threats.

2016-01-22

2016 Cyber Threat - Use To Advantage

Here are seven predictions for threat activity in 2016 from Security Week.

2016-01-20

Commercial Opportunities To Be Found In Security Problems

It's not only a vital defensive measure. There's money to be made from securing company data.

2016-01-20

Fighting Cybercrime Can Be Turned Into A Commercial Opportunity

Companies can use security initiatives to improve their customers’ experience and drive greater sales.

2016-01-19

Mentoring Startups: Technology Solving Education Problems

One to One: Startups are using online mentorship to combine the strengths of technology with the unique value of human beings.

2016-01-20

Hefty Fine Over False Encryption Claims

Dental software company pays a penalty for misleading customers on the level of encryption it provided to protect sensitive patient data.

2016-01-20

Anonymous Want Revenge For Saudi Executions

Hackers have targeted Saudi Arabia's Ministry of Defence website with a sustained DDoS attack.

2016-01-21

Russian Hackers Warn EU Trains Are Vulnerable to Hijack

Russian hackers have exposed gaping holes in computer systems that control train networks across Europe.

2016-01-19

Amazon’s Data Centers Are Located in US Spy Country

There's a reason Amazon Web Services are located close to US intelligence infrastructure.

2016-01-20

EU General Data Protection: A Milestone Of The Digital Age

The recently agreed-upon EU General Data Protection Regulation (GDPR) might be the most important piece of legislation in the history of the EU.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Bastille

Bastille

Bastille’s patented software and security sensors bring visibility to devices emitting radio signals (Wi-Fi, cellular, IoT) in your organization.

Vitrociset

Vitrociset

Vitrociset design complex systems for defence, homeland security, space and transport. Activities include secure communications and cybersecurity.

Foresite

Foresite

Foresite is a global service provider, delivering a range of managed security and consulting solutions.

Telesoft Technologies

Telesoft Technologies

Telesoft Technologies is a global provider of cyber security, telecom and government infrastructure products and services.

ST Engineering

ST Engineering

ST Engineering is a leading provider of trusted and innovative cybersecurity solutions.

Aergo

Aergo

Aergo offers an easier and more proven way to adopt blockchain and transform your business while building on your existing IT and cloud assets.

OurCrowd

OurCrowd

OurCrowd is a leading equity crowdfunding platform for investing in global startups.

RiskXchange

RiskXchange

RiskXchange's cybersecurity risk rating solution helps businesses solve complex cybersecurity and compliance challenges by providing a 360-degree view of your cybersecurity posture.

Neovera

Neovera

Neovera is a trusted provider of managed services including cyber security and enterprise cloud solutions, committed to delivering results through the innovative use of scalable enterprise-grade tech.

NeuVector

NeuVector

NeuVector, the leader in Full Lifecycle Container Security, delivers uncompromising end-to-end security from DevOps vulnerability protection to complete protection in production.

BIO-key

BIO-key

BIO-key is a pioneer and innovator, we are recognized as a leading developer of fingerprint biometric authentication and security solutions.

SECFORCE

SECFORCE

SECFORCE is a leading information security consultancy specialising in bespoke penetration testing and red team engagements.

AaDya

AaDya

AaDya provide smart, simple, affordable and effective cybersecurity software solutions for small and medium businesses.

CyberUK

CyberUK

CYBERUK is the UK government’s flagship cyber security event and the authoritative event for the UK’s cyber security community.

iSTORM

iSTORM

iStorm specialise in supporting organisations who require a range of Privacy, Security and Penetration testing related services.

Iron Mountain

Iron Mountain

Iron Mountain Incorporated is a global business dedicated to storing, protecting and managing, information and assets.