News

2015-07-21

CyberSecurity Future: Humans & Machines Work Symbiotically

Outnumbered: Because of the IoT there will be over 40 billion connected devices in use within five years.

2015-07-20

Assange says NSA intercepts 98% of S. American Coms

A growing list of American allies, in addition to France & Germany are being spied on by the NSA.

2015-07-20

Repelling the cyber-attackers

Good cybersecurity is not just a technology function.

2015-07-20

The Most Damaging Ramifications of DDoS Attacks

Loss of customer trust & confidence are the most damaging consequences of DDoS attacks.

2015-07-20

Airlines on Defence Amid Cyber Warfare: IATA

Greater levels of automation mean the aviation industry is more vulnerable to cyber threats

2015-07-18

The Focus on Terror has Distorted the Debate on Encryption

The Hacking Team scandal and a successful challenge to UK Surveillance laws coincide. Opinion by Alex Krasodomski

2015-07-17

The Right for Privacy in a World Where Everything is Shared

The latest revelations about Hacking Team, its products & it its clientele seem to shock everyone. Lets’ see how truly shocking this is.

2015-07-16

NATO missile system hacked remotely by ‘foreign source’

A German Army Patriot missile system was allegedly hacked by a remote source.

2015-07-16

New Case Highlights Deep Hole in Cyber Insurance

Mistake Exclusion means a failure to maintain adequate data security can turn out to be very costly.

2015-07-16

Bitcoins Berlin Launch for Cashless Greeks

Greek bank customers are limited to a 40 Euros cash withdrawal per day.Maybe Bitcoin will come in useful.

2015-07-17

Leveraging Drones to Improve Nuclear Facility Security and Safety

Drones currently represent equal parts threat and opportunity for nuclear facilities. Opinion by Caroline Baylon

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CERT-FR

CERT-FR

CERT-FR is the French national government computer security incident response team.

ProPay

ProPay

ProPay provides secure payment solutions for organizations ranging from small businesses to large enterprises requiring complex payment solutions.

NordForsk

NordForsk

NordForsk facilitates and provides funding for Nordic research cooperation and research infrastructure. Project areas include digitalisation and digital security.

Sliced Tech

Sliced Tech

Sliced Tech provides enterprise grade managed Cloud services, including Security-as-a-Services, aimed at meeting the needs of commercial and government clients from within Australia.

SecurityHQ

SecurityHQ

SecurityHQ (formerly known as Si Consult) is a Global Managed Security Service Provider (MSSP) that monitors networks 24/7, to ensure complete visibility and protection against your cyber threats.

JobStreet.com

JobStreet.com

JobStreet is one of Asia’s leading online employment marketplaces in Malaysia, Philippines, Singapore, Indonesia and Vietnam.

CyFIR

CyFIR

CyFIR is a network investigation and Incident Response tool for performing live computer investigations across any size enterprise.

Portshift

Portshift

Portshift leverages the power of Kubernetes and Service-Mesh to deliver a single source of truth for containers and cloud-native applications security.

Swissbit

Swissbit

Swissbit AG is the leading European manufacturer of storage, security and embedded IoT solutions for demanding applications.

Avrem Technologies

Avrem Technologies

Avrem Technologies is a business IT and cybersecurity consulting firm. We design, implement, manage and monitor the networks, servers, computers and software that our clients rely on each day.

Elba

Elba

Employee security needs to be reinvented. SaaS security needs to involve end-user and awareness needs to be actionable. Meet elba, the 5-in-one cybersecurity hub with no compromises.

Telarus

Telarus

Telarus is a Technology Services Brokerage that holds contracts with the world's leading cloud voice, contact center, cybersecurity, mobility and IoT providers.

QANplatform

QANplatform

QANplatform is a Quantum-resistant hybrid blockchain platform.

Icon Information Systems (ICONIS)

Icon Information Systems (ICONIS)

ICONIS is an integrated infrastructure and service provider, offering unified Information Technology (IT) solutions globally.

DarkHorse Security

DarkHorse Security

DarkHorse exists to make it easy and affordable for organizations to be able to identify their cybersecurity vulnerabilities.

Brava

Brava

Brava is your trusted Business Communications and Solutions partner serving the Caribbean and Atlantic region.