News

2015-09-25

UK’s Surveillance Dragnet Legal Challenge

A challenge to UK surveillance legislation aims to discover the scope of illegal data sharing taking place between the NSA and GCHQ.

2015-09-24

State Proxies & Plausible Deniability: Challenging Conventional Wisdom

States use proxies to claim plausible deniability for their cyber attacks. Does this reduce the risk of retaliation? Opinion by Jamie Collier

2015-09-21

Russia in Ukraine & Syria: US Revise Cyber Budget

Russia’s involvement in both Syria & Ukraine and it's overall role in cyberwarfare is the Pentagon's primary concern.

2015-09-21

UK Drone Strike on ISIS Raises Legal Questions

Further clarification is needed on the legal justification for the UK’s drone strike in Syria. Opinion by Harriet Moynihan

2015-09-25

What Does Facebook Want With AI?

Study into artificial intelligence research is no longer the preserve of universities.

2015-09-21

Spy Agencies Go Recruiting on LinkedIn

Mata Hari Goes Social: Enemy spies are attempting to recruit British civil servants by ‘befriending’ them on LinkedIn.

2015-09-21

Iran and Saudi Marching To Cyber War!

As the two powers vie for regional dominance in Yemen and Syria they have begun using cyber attacks to release critical intelligence.

2015-09-16

North Korean Leader Has His Own Cellular Network

Call Waiting: A secure VIP network just for the special people.

2015-09-16

Five Months After the OPM Attack.

The 21.5 million victims of the largest known U.S government breach will just begin receiving their notifications at the end of September.

2015-09-16

Russia & China Use Hacked Databases to Find US Spies

Foreign intelligence agencies are reportedly crosschecking hacked databases & compromised information for evidence.

2015-09-16

Should the US Use Hidden Data to Warn Industry of Attacks?

What is government’s role in leveraging the “Dark Web” to alert private-sector organizations they’re the target for attack?

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Fastpath Solutions

Fastpath Solutions

Fastpath deliver software solutions that enable you to take control of your security, compliance and risk management initiatives.

InfoWatch

InfoWatch

InfoWatch solutions allow you to protect data and information assets that are critically important to your business.

Datacom Systems

Datacom Systems

Datacom Systems is a leading manufacturer of network visibility solutions.

TrainACE

TrainACE

TrainACE, is a professional computer training school offering courses in information technology with a focus on Advanced Security training.

National Forensic Sciences University (NFSU) - India

National Forensic Sciences University (NFSU) - India

National Forensic Sciences University is the world’s first and only University dedicated to Digital Forensic and allied Sciences.

Pentest People

Pentest People

Pentest People are a UK-based security consultancy focussing on bringing the benefits of Pentesting as a Service (PTaaS) to all its clients.

Techleap.nl

Techleap.nl

Techleap.nl is a non-profit publicly funded organisation helping to quantify and accelerate the tech ecosystem of the Netherlands.

Echosec Systems

Echosec Systems

Echosec Systems is a data discovery company delivering social media and dark web threat intelligence. Our web based security software delivers critical information for situational awareness.

Silicon Cloud International

Silicon Cloud International

Silicon Cloud is a high performance and secure cloud computing platform for engineering and scientific applications.

Acreto

Acreto

Acreto is an end-to-end security infrastructure that protects all your technologies with a single, simple cloud service.

OnSecurity

OnSecurity

OnSecurity replaces the overhead of traditional penetration testing firms with a simple online interface, making it easy to book tests as and when needed.

Defentry

Defentry

Defentry have created an Ecosystem that lets our users easily monitor, train and resolve their digital security issues.

Turngate

Turngate

Turngate simplify security investigations so you can see employee activities and entitlements in your enterprise in seconds.

National Renewable Energy Laboratory (NREL) - USA

National Renewable Energy Laboratory (NREL) - USA

NREL is transforming energy through research, development, commercialization, and deployment of renewable energy and energy efficiency technologies.

Vortacity Cyber

Vortacity Cyber

Vortacity is a boutique cybersecurity provider specializing in associations, nonprofits, and mission-based organizations.

Cytacs

Cytacs

Cytacs is the AI-powered cyber security platform specifically designed for small and medium-scale enterprises.