FREE TO VIEW


« Back to News

2020-05-11

COVID-19 Tracing App Problems

There is a growing divergence in the technical concepts used to develop an effective mobile tool to trace COVID-19 infected mobile users.

2020-05-11

UK Business Faces Particular Lockdown Security Threats

British businesses must crack down on poor remote working practices now, or risk potentially catastrophic exposure once the lockdown is over.

2020-05-09

Healthcare, Finance, Industry & Human Behaviour Will Be Transformed

Anything that can be connected to the Internet eventually will be connected to the internet and we wont believe we ever lived without it.

2020-05-07

Microsoft Eliminates Cyber Attack Flaws

Microsoft's threat protection team has warned of a "significant and growing" threat to its remote working platform using seemingly harmless GIFs.

2020-05-05

Hackers Are Selling Your Social Media Data

An investigation shows that Social Media companies are failing to clamp down on scammers selling people's personal details.

2020-05-06

The Impact Of Artificial Intelligence On Cyber Security

As digital innovation picks up speed, AI will become much more important in cyber security, but in the wrong hands could prove dangerous.

2020-05-06

Remote Working Is Transforming The Security Landscape

Businesses face an operational crunch to sustain a remote work culture, because of lack of funds, shortage of clients and a reduced workforce.

2020-05-05

Looking For Vulnerable IoT Devices

It takes a deep dive to discover the many unseen, unsecured & vulnerable devices spread across the Internet of Things. By David Balaban

2020-05-05

Britain Cracks Down On Corona Crime

The NCSC has taken down more than 2,000 online scams linked to coronavirus as they crack down on criminals exploiting the health crisis.

2020-05-06

UK Virus Tracking App Goes On Trial

Millions of people in the UK will soon be asked to track their movements via smartphone to limit the spread of coronavirus, despite privacy concerns.

2020-05-04

Zoom 5.0 Aims To Reduce 'Zoom Bombing'

Zoom is a prime target for hackers and spies but security researchers are saying that even the new 5.0 app with encryption is a privacy threat.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LogRhythm

LogRhythm

LogRhythm's security platform unifies SIEM, log management, network and endpoint monitoring, user behaviour analytics, security automation and advanced security analytics.

Devo Technology

Devo Technology

Devo Security Operations is a next-gen cloud SIEM that enables you to gain complete visibility, reduce noise, and focus on the threats that matter most to the business.

Italian Association of Critical Infrastructure Experts (AIIC)

Italian Association of Critical Infrastructure Experts (AIIC)

AIIC acts as a focal point in Italy for expertise on the protection of Critical Infrastructure including ICT networks and cybersecurity.

Bugcrowd

Bugcrowd

As leaders in crowdsourced security testing, Bugcrowd connects companies and their applications to a crowd of tens of thousands of security researchers to identify critical software vulnerabilities.

H-11 Digital Forensics

H-11 Digital Forensics

H-11 Digital Forensics is a global leader of digital forensic technology.

ArmorText

ArmorText

ArmorText offers a seamless channel for communication and collaboration for organizations concerned with keeping communication data private and secure.

ISA Security Compliance Institute (ISCI)

ISA Security Compliance Institute (ISCI)

ISCI, a not-for-profit automation controls industry consortium, manages the ISASecure™ conformance certification program for industrial automation and control systems.

Anthony Timbers LLC

Anthony Timbers LLC

Anthony Timbers is a cybersecurity consulting and penetration testing firm providing services to the Federal and Commercial sectors nationwide.

FPT Software

FPT Software

As a leading technology service provider, FPT assists customers of all sizes and from any industries in implementing and adapting digital technologies including cybersecurity.

Hex-Rays

Hex-Rays

Founded in 2005, privately held, Belgium based, Hex-Rays SA focuses on the development of fast, stable, and robust binary analysis tools for the IT security market.

Naq Cyber

Naq Cyber

Naq is the number one platform for SMEs looking to become legally compliant and protect against cybercrime and other data-related incidents.

TheHive Project

TheHive Project

TheHive Project is a Scalable, Open Source and Free Security Incident Response Platform for SOC, CSIRT and CERT teams.

Telesystem

Telesystem

Telesystem empowers businesses across the USA with a range of innovative network, communication and collaboration solutions.

Darktrace

Darktrace

Darktrace is a global leader in cybersecurity AI, delivering complete AI-powered solutions in its mission to free the world of cyber disruption.

Mutare

Mutare

For three decades, Mutare has been empowering organizations to re-imagine a better way to connect through our transformative voice security, digital voice and text messaging solutions.

Supra ITS

Supra ITS

Supra ITS is a leading full-service technology partner offering IT Consulting, Cloud Services, 24x7 Managed IT & Cybersecurity Services, and IT Project Support.

Miggo Security

Miggo Security

Miggo is the first Application Detection and Response (ADR) platform on a mission to stop application breaches.

Amplifier Security

Amplifier Security

Amplifier Security are on a mission to empower security teams to modernize their practice by connecting the dots between their security stack and their people.