News

2015-10-28

Cyber Warfare: Regional Is Becoming Global

Today’s small wars and border conflicts are being fought online and under the radar, but the conflicts could escalate into real world wars.

2015-10-30

The Arrival of Algorithmic Business

In today’s digital era, dynamic, digital algorithms are at the core of new customer interactions.

2015-10-28

Hackers Compromise Cisco Web

Malicious, data stealing JavaScript injected in the Cisco Web VPN login page of targeted organizations is hosted on legitimate sites.

2015-10-28

Germany Will Make Telecoms Companies Disclose Data To Police.

Despite two previous laws having been ruled unconstitutional, data retention is back in Germany.

2015-10-28

Apple Removes Spy Apps

Apple recently removed several apps from its store that pose a security risk by exposing a person's Web traffic to untrusted sources.

2015-10-28

Banks Under Constant Hacker Attacks

When Hackers are looking to steal as much money as possible as quickly as possible, they go where the money is.

2015-10-28

Jobs Are Disappearing to the Digital Revolution

Gartner is forecasting some major changes in technology, especially in areas like 3D printing, machine learning and voice recognition.

2015-10-26

Your Personal Safety. There’s An App For That

A crowd sourced App that enables you to reach out for help to other users nearby.

2015-10-27

New Software To Identify ISIS Recruiters

Russian researchers are working on new computer software to locate potential ISIS recruiters online.

2015-10-27

UK Cybercrime & Online Fraud on the Rise

The changing face of crime in Britain has been underlined by new official data showing the growing threat of cyber crime and online fraud.

2015-10-27

Who Is responsible For Security in the Cloud?

Ponemon Survey: Only one third of respondents are confident the Cloud meets their security objectives.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Advent IM

Advent IM

Advent IM is one of the UK’s leading independent cyber security specialists, with a unique approach to providing holistic security management solutions.

Backup Systems

Backup Systems

Backup Systems is a leading backup and disaster recovery systems provider across the UK.

Disklabs

Disklabs

Disklabs are industry leaders in data recovery, digital forensics and data erasure.

TechDefence Labs

TechDefence Labs

TechDefence Labs provide pentesting and security assessment services for networks, web apps, mobile apps and source code reviews.

SentryBay

SentryBay

SentryBay is the global leader in preventative endpoint isolation protection. We protect remote, BYOD and corporate endpoints so they can safely and securely connect with your corporate network.

Salt Communications

Salt Communications

Salt communications is a global leader in secure communications. Our bespoke platform is the secure communications solution that uniquely gives complete control to our customers.

Ritz

Ritz

Ritz is the largest holistic pure-play cyber security solutions provider in Myanmar.

US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber Command is responsible for Navy information network operations, offensive and defensive cyberspace operations, space operations and signals intelligence.

Swish Data Corp.

Swish Data Corp.

Swish delivers when the problems are complex, requirements are difficult, and the mission is absolutely critical.

Quartz Network

Quartz Network

Quartz Network is a curated community for change-makers, up-and-comers, and professionals who are ready to grow, adapt, and thrive.

ZX Security

ZX Security

ZX Security is a New Zealand owned and operated cyber security consultancy.

Elastio

Elastio

Elastio's cloud-native platform safeguards cloud data from the risks posed by ransomware, application failures and storage security vulnerabilities.

Uptime Institute

Uptime Institute

Uptime Institute is an unbiased advisory organization focused on improving the performance, efficiency, and reliability of business critical infrastructure.

Amplix

Amplix

In the race to create value for your enterprise, Amplix is your best asset for making technology decisions and optimizing your IT infrastructure, cloud usage, and security posture.

Harness

Harness

Harness delivers an end-to-end software delivery platform that helps engineering teams achieve the highest levels of engineering excellence.

OryxAlign

OryxAlign

OryxAlign offer managed IT and cyber security, cloud and digital transformation, and tailored professional and consulting services.