News

2015-07-27

US vs Hackers: Still Losing

Computer networks of many U.S. federal agencies remain highly vulnerable to sophisticated cybercriminals.

2015-07-27

Internet of Things: A Mass Surveillance Infrastructure

‘The most powerful political tool ever created’

2015-07-27

Avoid Hiring a Cybercriminal: understand motivations & thoroughly vet employees

Employees are the biggest threat to business integrity. As FireEye has discovered.

2015-07-27

Automobile Industry Gears Up For Cyber-Threat

Threat Response: Automobile industry's intelligence sharing & analysis center (ISAC) is revving up to exchange cyber threat information.

2015-07-27

Hundreds of Thousands' of Vehicles At risk of Attack

Chrysler contemplate mass recall & software update to protect recent model Jeeps from remote control takeover.

2015-07-27

Dating Website Admits Hackers Have Stolen Data on Millions

Impact Team: Ashley Madison dating is website is thoroughly hacked for personal data for 37m people.

2015-07-24

Delivered: America’s Drone Debut

A Drone made from 3D printed parts will be first to have FAA approval for package deliveries.

2015-07-24

Hacking Team's Malware Uses a UEFI Rootkit

A Hacking Team tool that can modify a computer’s UEFI (Unified Extensible Firmware Interface) even after the hard drive is wiped.

2015-07-25

Finland – Prolific Hacker Arrested & Sentenced

Julius Kivimaki found guilty of 50.700 “instances of aggravated computer break-ins” affecting Harvard, MIT & a host of companies.

2015-07-24

Public-Private Partnerships in the Cyber Domain

Many ostensibly private sector technology firms are closely aligned with a particular nation state. Opinion by Jamie Collier

2015-07-24

United Hackers Given a Million Free Air Miles

Wearing a white hat: Hackers who spotted security holes in United Airline's website are well rewarded.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Conscio Technologies

Conscio Technologies

Conscio Technologies is a specialist in IT security awareness. Our solutions allow you to easily manage innovative online IT awareness campaigns.

Iceberg

Iceberg

Since 2016, Iceberg has redefined how businesses approach hiring in the Cybersecurity and eDiscovery space.

ECS

ECS

ECS is a leading information technology provider delivering cloud, cybersecurity, software development, IT modernization, and advanced science and engineering services.

GMV

GMV

GMV is a technological business group offering solutions, services and products in diverse sectors including Intelligent Transportation Systems, Cybersecurity, Telecoms and IT.

e-End

e-End

e-End provides hard drive shredding, degaussing and data destruction solutions validated by the highest electronic certifcations to keep you compliant with GLB, SOX, FACTA, FISMA, HIPAA, COPPA, ITAR.

High Wire Networks

High Wire Networks

High Wire Network’s Overwatch Managed Security Plaform-as-a-Service offers organizations end-to-end protection for networks, data, endpoints and users.

WolfSSL

WolfSSL

wolfSSL is an embedded SSL/TLS library providing secure communication for IoT, smart grid, connected home, routers, applications, games, phones, and more.

Allied Telesis

Allied Telesis

Allied Telesis delivers the secure, flexible, and agile solutions needed to meet the expectations of any industry’s critical mission.

ProCheckUp

ProCheckUp

ProCheckUp is a London-based independent provider of cyber security services, including IT Security, Assurance, Compliance and Incident Response.

Symptai Consulting

Symptai Consulting

Symptai Consulting is a leading Cyber Security, Digital Transformation and Anti-Money Laundering firm serving the Caribbean and the wider world.

Imageware

Imageware

Imageware is a leader in biometric cybersecurity. Protect against costly, damaging ransomware hacks by employing biometric cybersecurity solutions.

Avetta

Avetta

Avetta One is the industry’s largest Supply Chain Risk Management (SCRM) platform. It enables clients to manage supply chain risks and suppliers to prove the value of their business.

Sotero

Sotero

Sotero is the first cloud-native, zero trust data security platform that consolidates your entire security stack into one easy-to-manage environment.

Reach Security

Reach Security

Reach is the first generative AI platform purpose-built to empower enterprise security teams. With Reach, organizations measure, manage, and improve their enterprise security posture at scale.

Cyber Qubits

Cyber Qubits

Cyber Qubits is a cybersecurity training and consulting company focused on developing the next generation of cybersecurity professionals.

Hughes Network Systems

Hughes Network Systems

Hughes are industry leaders in networking technologies and services, innovating constantly to deliver the global solutions that power a connected future for people, enterprises and things everywhere.