FREE TO VIEW


« Back to News

2020-06-10

Honda Hit By Ransomware

Automotive giant Honda is experiencing a company-wide network outage that is suspected to have been caused by a ransomware attack.

2020-06-09

Artificial Intelligence Takes Microsoft Jobs

Microsoft is firing 27 journalists to replace them with an AI, fueling the debate over whether the technology is a job creator or a destroyer.

2020-06-09

Covid-19 Is Working Well For Criminals

The impact of the Coronavirus is so good for the cybercrime economy that it is reshaping the way that business is done on the Dark Web.

2020-06-08

Chinese Hackers Attacked EasyJet

The recent cyber attack that struck British airline EasyJet is thought have been carried out by Chinese hackers for espionage, not fraud.

2020-06-08

Britain Turns To AI To Counter Espionage

Cyber security threats require a speed of response far greater than humans are able to do and the spies at GCHQ want to use AI to do the job.

2020-06-08

Hackers Targeting Both Trump & Biden Presidential Campaigns

Deja-Vu All Over Again: Foreign hackers have targeted the email accounts of staff working on both of the US 2020 Presidential campaigns.

2020-06-05

Stanford University Offers The Best US Cyber Security Degree

The cyber security degree offered by Stanford University has been ranked the best in the United States.

2020-06-05

US Ban On Semiconductor Exports To China Hits Huawei

The UK is expected to conclude that US export controls preventing semiconductor exports to China will stop Huawei supplying 5G equipment.

2020-06-05

Taiwan's Entire Population Database Stolen

It is very unusual for an entire nation’s database to be leaked but the secret details of 20m Taiwanese citizens have appeared on the Dark Web.

2020-06-05

What Can Hold Up Your International Project?

The term “export controls” is enough to send most people to sleep, but in the cybersecurity world it can have often unforeseen consequences.

2020-06-03

US Police Display Powerful New Surveillance Tools

Drones, Geo-Tracking & Facial Recognition: US police are deploying a range of weapons previously unseen in a US domestic setting.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Becrypt

Becrypt

Becrypt is a trusted provider of endpoint cybersecurity software solutions. We help the most security conscious organisations to protect their customer, employee and intellectual property data.

Information Security Systems (ISSCOM)

Information Security Systems (ISSCOM)

ISSCOM provide services to help companies implement Information Security Management Systems (ISMS) by providing consultancy and hands-on assistance.

CCL Solutions Group

CCL Solutions Group

CCL is one of Europe’s leading digital investigation specialists, supporting law enforcement, government and organisations across both public and private sectors.

Dcoya

Dcoya

Dcoya's complete security awareness training program gives you out-of-the-box compliance with PCI-DSS, HIPAA, SOX and ISO regulations.

QSecure

QSecure

QSecure specializes in the provision of information security and risk management services.

Egyptian Supreme Cybersecurity Council (ESCC)

Egyptian Supreme Cybersecurity Council (ESCC)

ESCC is responsible for developing a national strategy to face and respond to the cyber threats and attacks and to oversee its implementation and update.

XM Cyber

XM Cyber

XM Cyber is a leading hybrid cloud security company that’s changing the way innovative organizations approach cyber risk.

YesWeHack

YesWeHack

YesWeHack offers companies an innovative approach to cybersecurity with Bug Bounty (pay-per-vulnerability discovered) to identify and report vulnerabilities in their systems.

Nihon Cyber Defense

Nihon Cyber Defense

Nihon Cyber Defence’s mission is to provide robust solutions, services and support to governments, corporates and organisations in order to protect them from all forms of cyber warfare.

SIA Group

SIA Group

SIA Group, an Indra company, combines Consulting, Systems Integration and Managed Services in four specialized business areas: Information Security, Storage, IT Management and IT Mobility.

Open Data Security (ODS)

Open Data Security (ODS)

Open Data Security is a market leader in the information security sector, offering services to companies, governments and individuals, helping them shield from hackers and cyber attacks.

WhiteJar

WhiteJar

WhiteJar offers an innovative approach to modern cybersecurity needs, empowering Ethical Hackers within its unique crowd platform.

Binalyze

Binalyze

Binalyze is the world's fastest and most comprehensive enterprise forensics solution. Our software helps you to collaborate and complete incident response investigations quickly.

ABPGroup

ABPGroup

ABPGroup is Asia’s leading cybersecurity technology provider focusing on providing best-of-breed solutions that address today’s pressing challenges.

Consortium

Consortium

Consortium goes beyond products and promises by working with enterprises to identify, acquire, and deploy cybersecurity solutions that matter.

SGNL

SGNL

SGNL redefines identity-first security by integrating business context, closing critical gaps, and transforming how enterprises manage privileged access for a secure, adaptive future.