News

2015-09-23

Xerox Memory Labels Fight Counterfeiting

A printed "memory label" from Xerox that stores 36 bits of data that can be encrypted and used for authentication & tracking

2015-09-23

Google's Self-driving Car Push Spurs Hiring Spree

Premium car makers are snapping up software experts as Google threaten to beat them in the race to a self-driving car.

2015-09-23

Hackers Can Spy on Every Mobile

There is a security hole in modern telecommunication systems that allows cyber criminals to listen in & to read text messages.

2015-09-22

India and US Cyber Agree Security Pact to Combat Crime

Facing a common threat from overseas cyber-attacks, India and the US recently decided to join hands in combating cyber crime.

2015-09-24

The Pentagon Goes Shopping For A New Mobile Phone

The Pentagon is trying to adopt private sector cyber technology with a new top-secret mobile, guest WiFi and Silicon Valley Interns.

2015-09-22

FBI Urges Firms to Plan For Cyber Attack

An FBI security expert calls on businesses of all sizes to make a cyber incident response plan to combat the big increase in global security threats.

2015-09-24

Why Cybercrime Now Exceeds Conventional Crime

Online crime worldwide is increasingly displacing conventional forms of property crime and often goes unreported and uninvestigated.

2015-09-25

Using Threat Intelligence Against Cybercriminals

Companies and governments do not traditionally share data about successful attacks. Threat Intelligence can fix that.

2015-09-22

The Shocking State of Cybercrime in Russia

Stolen credit cards, fraud, banking information theft & malware infections. Stealing from cryptocurrency wallets ... we could go on.

2015-09-22

Why Aren’t Companies Using Military Security?

Why do defense companies have classified networks to prevent cyber attack, while companies handling our critical utilities don’t?

2015-09-22

Vodafone Leaked Email on 'hacking' of Reporter

Vodafone Australia under pressure over the potentially unlawful access of private phone records to track down a journalist’s source.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Identity Theft Resource Center (ITRC)

Identity Theft Resource Center (ITRC)

ITRC is a non-profit organization established to empower and guide consumers, victims, business and government to minimize risk and mitigate the impact of identity compromise and crime.

Secure360

Secure360

Secure360 focuses on the following key areas: governance, risk and compliance, information security, physical security, business continuity management, and professional development.

Ambersail

Ambersail

Ambersail provide Penetration Testing and Cyber Security Compliance services.

Fenror7

Fenror7

Fenror7 lowers the TTD (Time To Detection) of hackers, malwares and APTs in enterprises and organizations from 300 days on average to 24 hrs or less.

SafeBreach

SafeBreach

SafeBreach's platform simulates hacker breach methods across the entire kill chain to identify breach scenarios in your environment before an attacker does.

Elitecyber Group

Elitecyber Group

Elitecyber group is a team of Cyber Security recruitment experts who work for Cyber Security and Cyber Defence clients and candidates throughout Europe.

Cyber Security Africa

Cyber Security Africa

Cyber Security Africa is a full-service Information Security Consulting firm offering a comprehensive range of Services and Products to help organizations protect their valuable assets.

Syndis

Syndis

Syndis is a leading information security company helping to defend organizations by providing bespoke services and innovative security solutions in the global market.

Venkon

Venkon

Venkon provides effective and unique solutions to cyber-security threats and IT compliance requirements of your organization.

Infuse Technology

Infuse Technology

Infuse Technology provide the highest level of cybersecurity support, implementing practical solutions to protect against cyber-attacks, from simple phishing scams to complex data security breaches.

Asimily

Asimily

Asimily’s IoMT risk remediation platform holistically secures the mission-critical healthcare devices that deliver safe and reliable care.

AMSYS Innovative Solutions

AMSYS Innovative Solutions

AMSYS is a full-service, 24/7/365 IT solutions, Cybersecurity & Managed Service Provider.

Extreme Networks

Extreme Networks

Since 1996, Extreme has been pushing the boundaries of networking technology, driven by a vision of making it simpler and faster as well as more agile and secure.

NMi Group

NMi Group

NMi Group is a global pioneer in mission-critical Testing, Inspection, Certification, and Calibration (TICC) services.

WeVerify

WeVerify

WeVerify is a platform for collaborative, decentralised content verification, tracking, and debunking.

Sherweb

Sherweb

Sherweb are a marketplace of leading cloud solutions and value-added services delivered by a team of passionate experts invested in MSP growth.