News

2015-07-07

The Changing Face of Cyber Risk for Law Firms

Law firms are a target of choice for cyber criminals due to their frequent & sizeable money transfers.

2015-07-06

China tightens grip over the Internet

US trade groups are worried that China's security policies could stifle their business.

2015-07-06

Keep Calm and Spy On: Why the OPM Hack Won’t Bring Down US Intelligence

The Wilderness of Mirrors: Nothing happened, nothing to see here, move along please ...

2015-07-06

Is The Tech Investment Bubble About To Burst ?

Is the tech industry is in denial about looming threats? There are sufficient indicators for those willing to open their eyes.

2015-07-06

Tough Rules Force Kenyan Net Users to List their Gadgets

Kenyans using public Wi-Fi to connect to the Internet will be required to register their mobile devices.

2015-07-03

Some Notes About Wassenaar

Wassenaar is an international arms control treaty which has recently added cyberweapons, with painful consequences for IT research.

2015-07-03

World Faces 'bloodless' Cyber War says India’s PM

"A Digital India where cyber security becomes an integral part of national security"

2015-07-03

Police campaign: UK Cybercrime Surges 27% in 2015

The 'Not With My Name' campaign will be highlighting advice focused on helping people protect their personal information.

2015-07-02

Merkel Bugged While Pondering Greece Crisis

Wikileaks release evidence that Chancellor Merkel's telephone calls are still being tapped.

2015-07-02

Court Briefly Returns NSA Surveillance Program

Has The USA Freedom Act really put an end to NSA's domestic bulk metadata collection? It seems not..

2015-07-02

Europol Tackles Cybercrime Ring

The cybercriminals attacked online banking systems, infecting machines, harvesting bank credentials & laundering money.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CDW

CDW

CDW is a leading multi-brand provider of information technology solutions to business, government, education and healthcare customers in the United States, the United Kingdom and Canada.

CyberSecurityJobsite.com

CyberSecurityJobsite.com

CyberSecurityJobsite.com is a specialist job board designed to attract candidates working within Cyber Security, Information Security or Information Assurance.

Sonatype

Sonatype

Sonatype protects the world's enterprise software from security, compliance, licensing risks, while reducing application development and deployment time.

LogicManager

LogicManager

LogicManager offer a complete set of IT governance, risk and compliance software solutions and advisory services.

FIDO Alliance

FIDO Alliance

FIDO Alliance is a non-profit organization formed to address the lack of interoperability among strong authentication devices.

Information-Technology Promotion Agency (IPA) - Japan

Information-Technology Promotion Agency (IPA) - Japan

IPA is an implementing agency in Japan with a role to address Information Security, IT Systems Reliability and IT Resource Development.

Quadrant Information Security

Quadrant Information Security

Quadrant Information Security is a consulting firm committed to supporting organizations in all vertical markets and protecting their sensitive data.

Rogue Wave Software

Rogue Wave Software

At Rogue Wave, our mission is to simplify your hardest problems, improve software quality and security, and shorten the time it takes to deliver value.

ESNC

ESNC

ESNC’s vulnerability management and real-time SAP security monitoring solutions help largest corporations in the world to effectively prioritize SAP security tasks and secure their business.

ShiftLeft

ShiftLeft

ShiftLeft is a continuous application security platform, purpose-built for the modern software development life cycle.

Veridium

Veridium

Veridium is a leader in single step - multi factor biometric authentication, designed to safeguard enterprises’ most critical assets.

World Cyber Security Summit

World Cyber Security Summit

World Cyber Security Summit, by Trescon, is a thought-leadership driven platform for CISOs who are looking to explore new-age threats and the technologies/strategies that can help mitigate them.

Arcserve

Arcserve

Defend your data with Arcserve all-in-one data protection and management solutions designed to be the right fit for your business, regardless of size or complexity.

Forward Global

Forward Global

Forward Global designs and delivers services and technologies to manage digital, economic, and information risks.

Frontier Technology Inc. (FTI)

Frontier Technology Inc. (FTI)

Frontier Technology Inc provides the technology and deep data expertise to drive the best defense and intelligence solutions.

CHERI Alliance

CHERI Alliance

CHERI Alliance is an industry initiative spearheading the global adoption of the Capability Hardware Enhanced RISC Instructions (CHERI) security technology across the computing industry.